{
  "type": "URL",
  "indicator": "https://ssl.gstatic.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ssl.gstatic.com",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #511",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #14",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain gstatic.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain gstatic.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2847775046,
      "indicator": "https://ssl.gstatic.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69b283a733a36fe75a38bb9c",
          "name": "The Gatby Script Loader",
          "description": "Im still hooked on the Belasco Chain being a thing.",
          "modified": "2026-04-18T05:29:25.398000",
          "created": "2026-03-12T09:13:11.392000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 227,
            "FileHash-MD5": 24,
            "FileHash-SHA1": 14,
            "domain": 64,
            "URL": 42,
            "hostname": 57,
            "CVE": 3,
            "IPv4": 1,
            "JA3": 1
          },
          "indicator_count": 433,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b7d96dfe022e3e33d347a2",
          "name": "CAPE Sandbox - \"undefined\"",
          "description": "",
          "modified": "2026-04-15T10:12:27.063000",
          "created": "2026-03-16T10:20:29.311000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 5,
            "FileHash-SHA1": 6,
            "FileHash-SHA256": 9,
            "domain": 24,
            "hostname": 112,
            "URL": 161,
            "CIDR": 9,
            "email": 2
          },
          "indicator_count": 328,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b786ef253f307468ab0d63",
          "name": "Project",
          "description": "Pulses, also known as Pulse.org, are being used to track users' activity on the internet and send emails to a website owned by GoDaddy.com, the company that owns the domain. <-- pretext not my thoughts but interesting and not my take though infra I suspect is targeted for geofencing and other abuse. researchers remain vigilint on infra",
          "modified": "2026-04-15T04:08:56.830000",
          "created": "2026-03-16T04:28:31.032000",
          "tags": [
            "united",
            "unknown",
            "as54113",
            "date",
            "aaaa",
            "status",
            "cname",
            "as44273 host",
            "moved",
            "passive dns",
            "title",
            "body",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 350,
            "FileHash-SHA1": 5,
            "domain": 501,
            "hostname": 1851,
            "email": 7,
            "CIDR": 6,
            "FileHash-SHA256": 8,
            "CVE": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2731,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6992bae83a5988dff8311490",
          "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
          "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
          "modified": "2026-04-13T23:46:20.071000",
          "created": "2026-02-16T06:36:24.788000",
          "tags": [
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
            "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#PotentialUS-Origin_FalseFlag_Obfuscation"
          ],
          "references": [
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
            "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
            "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
            "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
            "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
            "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
            "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
            "",
            "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
            "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
            "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
            "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
            "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
            "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
            "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
            "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
            "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
            "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
            "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
            "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
          ],
          "public": 1,
          "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware Family: StealthWorker / GoBrut",
              "display_name": "Malware Family: StealthWorker / GoBrut",
              "target": "/malware/Malware Family: StealthWorker / GoBrut"
            },
            {
              "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2166,
            "FileHash-SHA1": 2067,
            "FileHash-SHA256": 3371,
            "domain": 13295,
            "URL": 6860,
            "email": 272,
            "hostname": 4705,
            "SSLCertFingerprint": 268,
            "CVE": 107,
            "CIDR": 6
          },
          "indicator_count": 33117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69abd3a39b21902d77003ccb",
          "name": "domain iocs LI",
          "description": "Details and details of a malicious web address found in the linkedin.com community:-1-2-3-7-28 February 2017, and here is the full set of details.",
          "modified": "2026-04-06T08:01:04.640000",
          "created": "2026-03-07T07:28:35.218000",
          "tags": [
            "secure",
            "httponly",
            "path",
            "submission",
            "samesitenone",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "body",
            "title",
            "enjoy",
            "pragma",
            "date",
            "cloud"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 16,
            "FileHash-SHA1": 5,
            "FileHash-SHA256": 26,
            "URL": 180,
            "domain": 32,
            "hostname": 126,
            "email": 2
          },
          "indicator_count": 387,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "13 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ca3c8885ac1cb3171429a3",
          "name": "Untitled.",
          "description": "A full report on Google's security system, based on data gathered from 1,000 of its users' accounts, has been published by the Google Research Institute (GPRI) in the US.",
          "modified": "2026-03-31T21:23:41.012000",
          "created": "2026-03-30T09:04:08.040000",
          "tags": [
            "log id",
            "gmtn",
            "google trust",
            "ca issuers",
            "b0n timestamp",
            "pulse pulses",
            "http",
            "pulses otx",
            "pulses",
            "related tags",
            "false",
            "url https",
            "hostname",
            "filehashsha256",
            "source url"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 379,
            "FileHash-SHA256": 156,
            "SSLCertFingerprint": 2,
            "domain": 32,
            "hostname": 144,
            "IPv4": 52,
            "URL": 115,
            "FileHash-SHA1": 130
          },
          "indicator_count": 1010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ca3c89851a1aa0bf0185ff",
          "name": "Untitled.",
          "description": "A full report on Google's security system, based on data gathered from 1,000 of its users' accounts, has been published by the Google Research Institute (GPRI) in the US.",
          "modified": "2026-03-31T09:12:52.080000",
          "created": "2026-03-30T09:04:09.024000",
          "tags": [
            "log id",
            "gmtn",
            "google trust",
            "ca issuers",
            "b0n timestamp",
            "pulse pulses",
            "http",
            "pulses otx",
            "pulses",
            "related tags",
            "false",
            "url https",
            "hostname",
            "filehashsha256",
            "source url"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 118,
            "FileHash-SHA256": 166,
            "SSLCertFingerprint": 6,
            "domain": 68,
            "hostname": 90,
            "IPv4": 9,
            "URL": 118,
            "FileHash-SHA1": 106,
            "email": 1
          },
          "indicator_count": 682,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "19 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "690e47a694d9bc5c12d83bc0",
          "name": "LimeRAT | Dark Room Dennis | SpyGlassPrism HealthCare",
          "description": "Invasive, dark , illegal. Malicious. Will sift through malware Spyware systems. Perpetual remote connections.  Employed by Tam Legals Christopher P. Ahmann (Colorado government) to spy on, tamper with , annoy, terrorize, out of financial awards. \n\n spyglass-w_1_.png\n\nSize\n362B (362 bytes)\nMD5\n3c0e6546a44bd9a0f2768df07db5c1c9  Copy MD5 to clipboard\nSHA1\neddf26d1da4a140f2f963b8564c4e99cd6f1a677  Copy SHA1 to clipboard\nSHA256\n83eec393865a35363695d6f2416792d0117f551bb3e41d13b141d70e6b35e02c  Copy SHA256 to clipboard",
          "modified": "2025-12-07T18:01:48.980000",
          "created": "2025-11-07T19:25:26.827000",
          "tags": [
            "germany asn",
            "as24940 hetzner",
            "status connect",
            "associated",
            "present nov",
            "germany",
            "moved",
            "present oct",
            "accept",
            "germany unknown",
            "web trebuchet",
            "ms lucida",
            "grande lucida",
            "sans unicode",
            "lucida sans",
            "tahoma",
            "passive dns",
            "title",
            "error",
            "gmbh ccp",
            "germany germany",
            "asn as197540",
            "response ip",
            "address google",
            "safe browsing",
            "present jun",
            "present may",
            "present mar",
            "present jan",
            "urls",
            "aaaa",
            "gmt content",
            "type",
            "tags",
            "tag groups",
            "countries",
            "add country",
            "malware att",
            "ck it1140",
            "information",
            "cisco",
            "umbrella rank",
            "automatic",
            "webgl",
            "please",
            "november",
            "typeof function",
            "topropertykey",
            "masonry object",
            "prism function",
            "cookies",
            "source level",
            "reverse dns",
            "protocol h2",
            "security tls",
            "asn24940",
            "online gmbh",
            "general full",
            "url https",
            "falkenstein",
            "community forum",
            "it url",
            "youtube videos",
            "twitch kanal",
            "discord channel",
            "spenden",
            "shop url",
            "google",
            "hetzneras",
            "http",
            "april",
            "de summary",
            "ehingen",
            "march",
            "google safe",
            "browsing",
            "learn",
            "issues tab",
            "value",
            "masonry",
            "domainpath name",
            "cgjerrieegagfw",
            "label",
            "input",
            "suchen nach",
            "suche",
            "form",
            "hash",
            "name value",
            "main",
            "flag",
            "contacted hosts",
            "ip address",
            "process details",
            "windir",
            "openurl c",
            "prefetch2",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "a domains",
            "ascio",
            "china unknown",
            "record value",
            "apache",
            "encrypt",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "related tags",
            "certificate",
            "hostname add",
            "url analysis",
            "files",
            "domain",
            "files ip",
            "address",
            "asn as24940",
            "less",
            "raspberry pi",
            "ubiquiti",
            "remote",
            "hostname",
            "pulse submit",
            "status",
            "entries",
            "x xss",
            "sameorigin x",
            "unicode text",
            "utf8 text",
            "click",
            "strings",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "href",
            "show process",
            "network traffic",
            "general",
            "hybrid",
            "local",
            "path",
            "monitored target",
            "spyglass",
            "spyware.",
            "pegasus systems",
            "prism",
            "colorado leg",
            "christopher p.ahmann",
            "ahmann",
            "christopher",
            "P",
            "tam legal",
            "treece",
            "alfrey",
            "muscat",
            "criminal",
            "jeffrey reimer",
            "theft",
            "remote connect",
            "schroeder dennis"
          ],
          "references": [
            "Domain Name: schroederdennis.de | Status: connect",
            "remote.tecbuddy.de | remote.schneider-hv.de | remotedesktop.thedipling",
            "root-dns.netcup",
            "device-*******-*****-****-****-*********.remotewd.com",
            "ai-sandboxes.com",
            "Why Is this always a problem? Just curious. - http://wyblog.us/blog/rants/strikers-get-unemployment-benefits",
            "$ is funneled back to government, (quasi) , bonused \u2018doctors\u2019 State \u2018experts\u2019  who\u2026",
            "\u2026lie about the severity of injuries and do crap like this.",
            "This money belongs to people who paid  insurance to cover on job  injuries that happen in the job.",
            "Premise liability covers premises, employees and premises visitors. Weaponizing is not covered.",
            "Those attacked are the severely injured, survivors of dead workers, victims of providers.",
            "These people aren\u2019t in the dark. They are clear of the need to pay benefits.",
            "There are absolute losers in the dole  illegally benefiting from the suffering others.",
            "https://hybrid-analysis.com/sample/00f5292bbe68d9edc68f9a22a750eafb58e4f8474e15a48e3cc217fbbd0cdef9/690e24bb39c801e6d80a824e",
            "\u2022 http://demo.ideaboxthemes.com/prism",
            "https://photoprism.thedipling.dns64.de/ \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk",
            "photoprism.thedipling.dns64.de \u2022  https://schroederdennis.de/wp-content/plugins/highlighting-code-block/assets/js/prism.js?ver=2.0.1",
            "\"OC47TWOY.txt\" has type \"ASCII text\"- [targetUID: N/A] \"spyglass-w_1_.png\" has type \"Unknown\"- [targetUID: N/A]",
            "\"spyglass-w_1_.png\" has type \"Unknown\" and extension \"png\" \"clock-g_1_.png\" has type \"Unknown\" and extension \"png\"",
            "Domain healthcareshapers.com \u2022  https://www.healthcareshapers.com/",
            "www.ventoxhealthcare.in \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk",
            "https://cullenbehavioralhealth.theraplatform.com/ \u2022 amghealthnetwork.com",
            "3ddruck-celle.de",
            "wwwwww.publicpublicwww.portal.apple-apple-number3.ipv64.net",
            "sonarr.app.pineapplegod.co.nz",
            "http://svc.ghlink.com/svc/Authenticate/Applications",
            "https://sap.dswd.gov.ph.index.ph \u2022 login.prod.siecm.gov.mg \u2022 nre-362.dev.nre.gss.gov.uk",
            "sdp-dev-ingest.ci.lineageandprovenance.gss.gov.uk",
            "http://www.xonitec.com/pornosu/yuotubesex.html",
            "rowanandbenporn.ssssssssssssshadow.home64.de",
            "https://pagead2.googlesyndication.com/pagead/ads?ltd_cs=1&client=ca-pub-6165363645315831&output=html&adk=1812271804&adf=3025194257&lmt=1713778114&plat=3%3A16%2C4%3A16%2C8%3A4194304%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=https%3A%2F%2Fschroederdennis.de%2Fubiquiti%2Fubiquiti-unifi-u6-plus-vs-u6-lite-vergleich-access-point-wifi%2F&pra=5&wgl=1&easpi=0&asro=0&uach=WyJXaW4zMiIsIjEwLjAuMCIsIng4NiIsIiIsIjEyNC4wLjYzNjcuNjAiLG51bGwsMCx",
            "https://urlscan.io/result/019a5fbd-e7c6-743a-b9a7-a20e8b2943cd/",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Packed.Rrat-9798963-0",
              "display_name": "Win.Packed.Rrat-9798963-0",
              "target": null
            },
            {
              "id": "Win.Dropper.LimeRAT-9776087-0",
              "display_name": "Win.Dropper.LimeRAT-9776087-0",
              "target": null
            },
            {
              "id": "Malware Packed",
              "display_name": "Malware Packed",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1258,
            "hostname": 2018,
            "URL": 3033,
            "FileHash-SHA256": 651,
            "email": 4,
            "FileHash-MD5": 62,
            "FileHash-SHA1": 69,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 7100,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "133 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6916d97edb28b2616ffac3ab",
          "name": "njRAT| BazarLoader| Darkside 2020 .Beware \u2022 WebToolbar \u2022 Qbot",
          "description": "",
          "modified": "2025-11-14T07:41:19.912000",
          "created": "2025-11-14T07:25:50.524000",
          "tags": [
            "whois record",
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "communicating",
            "subdomains",
            "domains",
            "problems",
            "urls http",
            "ransomware",
            "malware",
            "contacted",
            "dropped",
            "execution",
            "tsara brashears",
            "apple ios",
            "whois whois",
            "unlocker",
            "njrat",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "awful",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "tofsee",
            "mitre attack",
            "et",
            "cisco umbrella",
            "internet storm",
            "site",
            "covid19",
            "cyber threat",
            "safe site",
            "cobalt strike",
            "malicious url",
            "alexa",
            "script urls",
            "united",
            "a domains",
            "as396982 google",
            "as15169 google",
            "search",
            "cname",
            "accept encoding",
            "showing",
            "unknown",
            "date",
            "body",
            "meta",
            "encrypt",
            "domain related",
            "as396982",
            "creation date",
            "expiration date",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "next",
            "all search",
            "otx octoseek",
            "as7922 comcast",
            "as16276",
            "as54113",
            "aaaa",
            "france unknown",
            "as14061",
            "status",
            "as40509",
            "ip address",
            "for privacy",
            "as44273 host",
            "record value",
            "certificate",
            "gmt content",
            "x sucuri",
            "as8075",
            "nxdomain",
            "as30148 sucuri",
            "as20940",
            "as31898 oracle",
            "hong kong",
            "as139021",
            "msie",
            "chrome",
            "ipv4",
            "blacklist http",
            "detection list",
            "blacklist",
            "files",
            "location hong",
            "kong asn",
            "tags none",
            "indicator facts",
            "name verdict",
            "falcon sandbox",
            "mail spammer",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "heur",
            "malicious site",
            "alexa top",
            "million",
            "alexa proxy",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "artemis",
            "dropper",
            "mediaget",
            "crack",
            "spammer",
            "france mail",
            "summary",
            "url summary",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "threat report",
            "ip summary",
            "pattern match",
            "script",
            "et tor",
            "known tor",
            "relayrouter",
            "node traffic",
            "misc attack",
            "beginstring",
            "null",
            "error",
            "span",
            "class",
            "generator",
            "refresh",
            "tools",
            "hybrid",
            "general",
            "click",
            "strings",
            "servers",
            "ps ord",
            "name servers",
            "poetry",
            "moved",
            "content length",
            "content type",
            "x powered",
            "poems",
            "poem",
            "topic",
            "topics",
            "poem topics",
            "free poems",
            "love poems",
            "romantic poems",
            "classic poems",
            "friendship poems",
            "shone pale",
            "herself",
            "heavens",
            "her beam",
            "a fleecy",
            "proud evening",
            "star",
            "thou bearest",
            "heaven",
            "than",
            "google",
            "http",
            "leasewebuklon11",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "february",
            "gb summary",
            "london",
            "april",
            "screenshot",
            "url https",
            "reverse dns",
            "general full",
            "name value",
            "frankfurt",
            "main",
            "germany",
            "asn15169",
            "resource",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "blacklist https",
            "phishing site",
            "malware site",
            "riskware",
            "opencandy",
            "cleaner",
            "iframe",
            "xtrat",
            "agent",
            "softcnapp",
            "generic",
            "patcher",
            "driverpack",
            "exploit",
            "mimikatz",
            "downldr",
            "presenoker",
            "fusioncore",
            "wacatac",
            "beach research",
            "trojanspy",
            "maltiverse",
            "firehol",
            "proxy",
            "anonymizer",
            "adware",
            "kuaizip",
            "downer",
            "tag count",
            "tue apr",
            "sample",
            "samples",
            "fakealert",
            "genkryptik",
            "icedid",
            "coinminer",
            "nircmd",
            "swrort",
            "systweak",
            "behav",
            "tiggre",
            "filetour",
            "quasar rat",
            "fuery",
            "bazaloader",
            "media",
            "facebook",
            "service",
            "runescape",
            "webtoolbar",
            "a9dia",
            "a1ginaprincipal",
            "emails",
            "registrar",
            "http header",
            "tcp traffic",
            "et useragents",
            "unknown traffic",
            "antivirus",
            "server",
            "gmt united",
            "accept",
            "local",
            "path",
            "falcon",
            "file",
            "ascii text",
            "windows nt",
            "png image",
            "appdata",
            "jpeg image",
            "indicator",
            "twitter",
            "westlaw njrat",
            "zuorat",
            "skynet bot",
            "glupteba",
            "asn4583",
            "thomsonreuters",
            "asn209242",
            "june",
            "back",
            "united kingdom",
            "cisco",
            "umbrella rank",
            "rank",
            "page url",
            "as autonomous",
            "system",
            "yndx",
            "ipasns ip",
            "november",
            "de summary",
            "comodo rsa",
            "security tls",
            "software",
            "resource hash",
            "security",
            "ecdhersa",
            "de indicators",
            "de page",
            "url history",
            "javascript",
            "gts ca",
            "secure server",
            "markmonitor",
            "ip information",
            "detail domains",
            "domain tree",
            "links certs",
            "frames domain",
            "requested",
            "threat roundup",
            "march",
            "threat round",
            "parent parent",
            "roundup",
            "january",
            "threats",
            "qbot",
            "cyberwar",
            "skynet",
            "radar ineractive",
            "control server",
            "engineering",
            "host",
            "services",
            "pony",
            "nanocore rat",
            "meterpreter",
            "zeus",
            "zbot",
            "suppobox",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "laplasclipper",
            "asn16276",
            "get h2",
            "kb image",
            "august",
            "kali",
            "localappdata",
            "network traffic",
            "binary file",
            "svg scalable",
            "vector graphics",
            "mwin",
            "domain",
            "url http",
            "pulse pulses",
            "related nids",
            "files location",
            "customer",
            "address",
            "as29789",
            "hosting",
            "location united",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "urls date",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present mar",
            "pulse indicator",
            "protocol h2",
            "value",
            "variables",
            "waypoint object",
            "gsqueue",
            "isotope",
            "hostnames",
            "ice fog",
            "maltiverse top",
            "financial",
            "as62597 nsone",
            "sec ch",
            "domains show",
            "entries",
            "as14720 gamma",
            "canada unknown",
            "as397241",
            "as13335",
            "applicunwnt",
            "xrat",
            "maltiverse safe",
            "aig",
            "soc",
            "hallrender",
            "brian sabey",
            "mark brian sabey",
            "sabey",
            "mark",
            "sabey",
            "data center",
            "malvertizing",
            "malware host",
            "scanning host",
            "botnetwork",
            "colorado",
            "edsaid",
            "geotracking",
            "satellite tracking",
            "radar tracking",
            "pornhub",
            "child teen content illegal",
            "social engineering",
            "cyber stalking",
            "CVE-2023-4966",
            "device control",
            "camera usage",
            "hidden users",
            "message interception",
            "text archiver",
            "mail collection",
            "remote attacks",
            "js",
            "python",
            "inject",
            "sql",
            "extraction",
            "AIG Claims",
            "hallrender.com",
            "soc",
            "milemighmedia",
            "westlaw",
            "revengeporn",
            "bot",
            "regex",
            "ai",
            "yandex"
          ],
          "references": [
            "web2.westlaw.com    (redirects to thbrzzrstr.me)",
            "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
            "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
            "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
            "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
            "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Malware Host: HallRender.com",
            "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
            "safebae.org",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
            "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "Poemhunter.com + rally point.com = pornhub.dev",
            "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
            "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
            "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
            "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://matrix.pornhub.dev",
            "nr-data.net",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
            "https://apple.pantion.top/",
            "newrelic.se",
            "user-apple.info",
            "appleid-comloginaccount.info",
            "init-p01st.push.apple.com",
            "boostmobile.com",
            "www.metrobyt-mobile.com",
            "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
            "https://b.link/infringement",
            "my.mintmobile.com",
            "CVE-2023-4966",
            "http://watchhers.net/index.php",
            "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Spain",
            "Netherlands",
            "Canada",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1427",
              "name": "Attack PC via USB Connection",
              "display_name": "T1427 - Attack PC via USB Connection"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1173",
              "name": "Dynamic Data Exchange",
              "display_name": "T1173 - Dynamic Data Exchange"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654971c396ca4306a6534b12",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4037,
            "hostname": 2241,
            "URL": 2516,
            "FileHash-MD5": 1224,
            "FileHash-SHA1": 783,
            "FileHash-SHA256": 2796,
            "CVE": 10,
            "email": 25
          },
          "indicator_count": 13632,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "156 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6889153bb756c703bd61c97d",
          "name": "Calisto - APT - 07.29.25 - UA ChromeBook Retro",
          "description": "Maldoc Calisto - 03.17.23\nRetroanalysis of a simple test to demonstrate a point (had some extensions to capture data). Borrowed a Google Chromebook From University of Alberta & signed in to my CCID on Campus with the Chromebook provided by Office of DOS (provided to them by 'offside IT'. Chromebook did not do so well. Returned. \n\nMAL_PDF_Calisto_PDF_Streams_Jul_09 (Threatzone)\nThis supports findings from Beehive Security who later blocked Calisto/Callisto with their MDR Solution.",
          "modified": "2025-09-03T00:22:10.750000",
          "created": "2025-07-29T18:38:51.647000",
          "tags": [
            "triage",
            "malware",
            "analysis",
            "report",
            "reported",
            "analyze",
            "sandbox",
            "download submit",
            "sha512",
            "sha1",
            "filesize",
            "sha256",
            "file",
            "token",
            "prefetch8",
            "prefetch1",
            "dataprofile",
            "general",
            "config",
            "download",
            "copy",
            "target",
            "defense",
            "generic",
            "impact",
            "virus",
            "trojan",
            "ransomware",
            "static",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "online",
            "submit",
            "sample",
            "platform",
            "vxstream",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "switch",
            "inquest labs",
            "resources api",
            "notes supported",
            "cve list",
            "drop your",
            "service",
            "privacy policy",
            "found url",
            "ck id",
            "details found",
            "ingress tool",
            "transfer",
            "t1105",
            "details url",
            "t1571",
            "pdf found",
            "found",
            "contentparse",
            "externalparser",
            "woff2",
            "inputfile",
            "domainresolve",
            "u200c200d",
            "u25cc",
            "ioc value",
            "Callisto",
            "Maldoc",
            "UAlberta",
            "U of A",
            "Chromebook",
            "Microsoft",
            "Google",
            "Telus",
            "Calisto",
            "APT"
          ],
          "references": [
            "https://tria.ge/250729-wr59yabk7y/behavioral2",
            "https://www.filescan.io/uploads/68890e2dc79df08ef097cd38/reports/06923db6-30ae-455f-8026-73461cc1472e/overview",
            "https://hybrid-analysis.com/sample/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
            "https://metadefender.com/results/file/YTI1MDcyOXl4LTdxa1I5ZlVJNGVsWTRUS2kz_mdaas",
            "https://polyswarm.network/scan/results/file/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce",
            "https://app.threat.zone/submission/5879c4fe-ce35-45c3-8a3c-e8c06d0e2b2d/overview",
            "https://tip.neiki.dev/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
            "https://www.virustotal.com/gui/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
            "https://www.virustotal.com/gui/file-analysis/MTllN2NiNTVkMGQ1MTYzNGY0OTg4MGY2MmRiYmNjYzg6MTc1MzgxNDIzNQ==",
            "https://vtbehaviour.commondatastorage.googleapis.com/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1753815427&Signature=BM1MWONwwKd011yMi5XzJJHo01QYs0qWdERlFPM9BGS4OW62YRzI4FX6aMwA6MgQB2eLDnMBjwIYw2ct1yC2HAzJ82eh6VqtBu%2BiE6lObCQjjON9nx29EKx9dGSRLewI3Zjpp7Kbokc%2FIKEh40ZNmeXNc4aCsECY%2Fwq9FQOmT2vm8Bi6IHzZNBMT3srLRZsr%2Bo36MP6ckdybeglLLnb9LA5iEOYbMBMEq6HxMj%2BfLIssDjKInHz7",
            "https://hybrid-analysis.com/sample/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce/6889105954703efa4303f7c7",
            "https://malpedia.caad.fkie.fraunhofer.de/actor/callisto"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "MAL_PDF_Calisto_PDF_Streams_Jul_09",
              "display_name": "MAL_PDF_Calisto_PDF_Streams_Jul_09",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1217",
              "name": "Browser Bookmark Discovery",
              "display_name": "T1217 - Browser Bookmark Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            }
          ],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6319,
            "CIDR": 11,
            "CVE": 9,
            "FileHash-MD5": 323,
            "FileHash-SHA1": 260,
            "FileHash-SHA256": 292,
            "domain": 596,
            "email": 37,
            "hostname": 806
          },
          "indicator_count": 8653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 131,
          "modified_text": "228 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68730c407f8484c524c2d7f4",
          "name": "The Denver Post used for Fake news | Foundry  | Twitter | Porn",
          "description": "Is the Denver Post a honey pot? Portal? Used for investigating? Smear campaigns? \n\nVictims reported for multiple years their names have been advertised in malicious red report campaigns, obituaries, threats. This has been true of the Ricky Mountain News which has been out of business for years and Denver Post.\n\n\nI can\u2019t annotate so I can\u2019t include references.\nReferences:\nFoundry\nTwitter\nDouglas Undersheriff who was either being smeared or heading a smear campaign.\nPorn\nTwitter \nInjured worker\u2019s compensation targets with la he loss including death.\nThey don\u2019t want to pay. Crazy fact: Workers compensation keeps the nearly a billion $ annually tax free. Does not want to pay. Bonuses doctors and anyone who will deny truly injured workers their compensation. \n#callthecopsifyousee_o-o_t_pac",
          "modified": "2025-08-12T01:02:51.771000",
          "created": "2025-07-13T01:30:40.917000",
          "tags": [
            "gtmtlfp4r",
            "utc gtmtlfp4r",
            "domains",
            "hashes",
            "reverse dns",
            "url https",
            "general full",
            "united",
            "security tls",
            "resource",
            "protocol h2",
            "software",
            "hash",
            "name value",
            "main",
            "spurlock",
            "carlos illescas",
            "wordpress",
            "denver post",
            "server nginx",
            "date sun",
            "gmt contenttype",
            "connection",
            "wordpress vip",
            "https",
            "link",
            "json",
            "contentencoding",
            "miss xrq",
            "value",
            "july",
            "variables",
            "osano function",
            "gpp function",
            "tcfapi function",
            "uspapi",
            "mg2 string",
            "bcclass",
            "dfmadmodslevel",
            "xblocker",
            "extraction",
            "data upload",
            "extrac",
            "included data",
            "review ious",
            "u excluded",
            "suggesteroo",
            "ony incude",
            "failed",
            "so type",
            "extra data",
            "includec review",
            "exclude suggest",
            "find s",
            "s type",
            "ur extraction",
            "extract",
            "included ic",
            "review ioc",
            "type no",
            "extri",
            "include review",
            "exclude sugges",
            "typ filel",
            "filet filet"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1774,
            "FileHash-SHA256": 3808,
            "domain": 373,
            "FileHash-MD5": 155,
            "FileHash-SHA1": 135,
            "hostname": 1156
          },
          "indicator_count": 7401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "677f2ad06835a8bf460ca1ac",
          "name": "GoogleUpdateSetup.exe       https://csp.withgoogle.com/csp/report-to.apps-themes",
          "description": "9af778a935057048dfaadd80b7d7dac020be4468f629f33c14d124a5720bf988  /1 rok temu\nf214569cb8e9eb9a425cf5172498d6c2173f01286da7289e376a23cdc369d2ba /5 lat temu\nddd4fc0b2db98ac02ebf806159e70e470664ce3f89f63e177e736ed8261a993c  /9 lat temu",
          "modified": "2025-05-14T21:16:59.156000",
          "created": "2025-01-09T01:48:00.966000",
          "tags": [
            "sha256",
            "ssdeep",
            "file type",
            "png multimedia",
            "aden",
            "self",
            "skrypt",
            "default",
            "rticon english",
            "vs2013",
            "google update",
            "google inc",
            "time stamping",
            "compiler",
            "date",
            "utc first",
            "submission",
            "korean",
            "brazilian",
            "ascii text",
            "wane",
            "ikona rt",
            "angielski usa",
            "informacje",
            "status wany",
            "odcisk",
            "numer",
            "win32",
            "generic",
            "valid",
            "serial number",
            "algorithm",
            "from",
            "symantec time",
            "stamping",
            "code signing",
            "thumbprint",
            "class"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 139,
            "FileHash-SHA1": 131,
            "FileHash-SHA256": 450,
            "URL": 10,
            "hostname": 6
          },
          "indicator_count": 736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c7c4116e56d78702dd38ad",
          "name": "InQuest - 22-08-2024",
          "description": "",
          "modified": "2024-09-21T23:00:38.725000",
          "created": "2024-08-22T23:04:49.499000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 6,
            "URL": 203,
            "FileHash-SHA256": 1,
            "hostname": 58,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 40
          },
          "indicator_count": 314,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "574 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c672884a5a8e32131dfd69",
          "name": "InQuest - 21-08-2024",
          "description": "",
          "modified": "2024-09-20T23:05:17.284000",
          "created": "2024-08-21T23:04:40.612000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 6,
            "URL": 199,
            "FileHash-SHA256": 1,
            "hostname": 51,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 43
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "575 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c520a736abef9223238164",
          "name": "InQuest - 20-08-2024",
          "description": "",
          "modified": "2024-09-19T23:04:15.781000",
          "created": "2024-08-20T23:03:03.472000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4,
            "hostname": 55,
            "URL": 215,
            "domain": 6,
            "FileHash-MD5": 46,
            "FileHash-SHA1": 6
          },
          "indicator_count": 332,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "576 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c3d01623155e5ed0012368",
          "name": "InQuest - 19-08-2024",
          "description": "",
          "modified": "2024-09-18T23:04:39.329000",
          "created": "2024-08-19T23:07:02.343000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4,
            "hostname": 51,
            "URL": 202,
            "domain": 5,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 6
          },
          "indicator_count": 312,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "577 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d95bd10bfcc8c3dd66a44d",
          "name": "Qbot ",
          "description": "",
          "modified": "2024-09-05T09:51:10.113000",
          "created": "2024-09-05T07:20:49.138000",
          "tags": [
            "whois record",
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "communicating",
            "subdomains",
            "domains",
            "problems",
            "urls http",
            "ransomware",
            "malware",
            "contacted",
            "dropped",
            "execution",
            "tsara brashears",
            "apple ios",
            "whois whois",
            "unlocker",
            "njrat",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "awful",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "tofsee",
            "mitre attack",
            "et",
            "cisco umbrella",
            "internet storm",
            "site",
            "covid19",
            "cyber threat",
            "safe site",
            "cobalt strike",
            "malicious url",
            "alexa",
            "script urls",
            "united",
            "a domains",
            "as396982 google",
            "as15169 google",
            "search",
            "cname",
            "accept encoding",
            "showing",
            "unknown",
            "date",
            "body",
            "meta",
            "encrypt",
            "domain related",
            "as396982",
            "creation date",
            "expiration date",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "next",
            "all search",
            "otx octoseek",
            "as7922 comcast",
            "as16276",
            "as54113",
            "aaaa",
            "france unknown",
            "as14061",
            "status",
            "as40509",
            "ip address",
            "for privacy",
            "as44273 host",
            "record value",
            "certificate",
            "gmt content",
            "x sucuri",
            "as8075",
            "nxdomain",
            "as30148 sucuri",
            "as20940",
            "as31898 oracle",
            "hong kong",
            "as139021",
            "msie",
            "chrome",
            "ipv4",
            "blacklist http",
            "detection list",
            "blacklist",
            "files",
            "location hong",
            "kong asn",
            "tags none",
            "indicator facts",
            "name verdict",
            "falcon sandbox",
            "mail spammer",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "heur",
            "malicious site",
            "alexa top",
            "million",
            "alexa proxy",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "artemis",
            "dropper",
            "mediaget",
            "crack",
            "spammer",
            "france mail",
            "summary",
            "url summary",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "threat report",
            "ip summary",
            "pattern match",
            "script",
            "et tor",
            "known tor",
            "relayrouter",
            "node traffic",
            "misc attack",
            "beginstring",
            "null",
            "error",
            "span",
            "class",
            "generator",
            "refresh",
            "tools",
            "hybrid",
            "general",
            "click",
            "strings",
            "servers",
            "ps ord",
            "name servers",
            "poetry",
            "moved",
            "content length",
            "content type",
            "x powered",
            "poems",
            "poem",
            "topic",
            "topics",
            "poem topics",
            "free poems",
            "love poems",
            "romantic poems",
            "classic poems",
            "friendship poems",
            "shone pale",
            "herself",
            "heavens",
            "her beam",
            "a fleecy",
            "proud evening",
            "star",
            "thou bearest",
            "heaven",
            "than",
            "google",
            "http",
            "leasewebuklon11",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "february",
            "gb summary",
            "london",
            "april",
            "screenshot",
            "url https",
            "reverse dns",
            "general full",
            "name value",
            "frankfurt",
            "main",
            "germany",
            "asn15169",
            "resource",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "blacklist https",
            "phishing site",
            "malware site",
            "riskware",
            "opencandy",
            "cleaner",
            "iframe",
            "xtrat",
            "agent",
            "softcnapp",
            "generic",
            "patcher",
            "driverpack",
            "exploit",
            "mimikatz",
            "downldr",
            "presenoker",
            "fusioncore",
            "wacatac",
            "beach research",
            "trojanspy",
            "maltiverse",
            "firehol",
            "proxy",
            "anonymizer",
            "adware",
            "kuaizip",
            "downer",
            "tag count",
            "tue apr",
            "sample",
            "samples",
            "fakealert",
            "genkryptik",
            "icedid",
            "coinminer",
            "nircmd",
            "swrort",
            "systweak",
            "behav",
            "tiggre",
            "filetour",
            "quasar rat",
            "fuery",
            "bazaloader",
            "media",
            "facebook",
            "service",
            "runescape",
            "webtoolbar",
            "a9dia",
            "a1ginaprincipal",
            "emails",
            "registrar",
            "http header",
            "tcp traffic",
            "et useragents",
            "unknown traffic",
            "antivirus",
            "server",
            "gmt united",
            "accept",
            "local",
            "path",
            "falcon",
            "file",
            "ascii text",
            "windows nt",
            "png image",
            "appdata",
            "jpeg image",
            "indicator",
            "twitter",
            "westlaw njrat",
            "zuorat",
            "skynet bot",
            "glupteba",
            "asn4583",
            "thomsonreuters",
            "asn209242",
            "june",
            "back",
            "united kingdom",
            "cisco",
            "umbrella rank",
            "rank",
            "page url",
            "as autonomous",
            "system",
            "yndx",
            "ipasns ip",
            "november",
            "de summary",
            "comodo rsa",
            "security tls",
            "software",
            "resource hash",
            "security",
            "ecdhersa",
            "de indicators",
            "de page",
            "url history",
            "javascript",
            "gts ca",
            "secure server",
            "markmonitor",
            "ip information",
            "detail domains",
            "domain tree",
            "links certs",
            "frames domain",
            "requested",
            "threat roundup",
            "march",
            "threat round",
            "parent parent",
            "roundup",
            "january",
            "threats",
            "qbot",
            "cyberwar",
            "skynet",
            "radar ineractive",
            "control server",
            "engineering",
            "host",
            "services",
            "pony",
            "nanocore rat",
            "meterpreter",
            "zeus",
            "zbot",
            "suppobox",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "laplasclipper",
            "asn16276",
            "get h2",
            "kb image",
            "august",
            "kali",
            "localappdata",
            "network traffic",
            "binary file",
            "svg scalable",
            "vector graphics",
            "mwin",
            "domain",
            "url http",
            "pulse pulses",
            "related nids",
            "files location",
            "customer",
            "address",
            "as29789",
            "hosting",
            "location united",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "urls date",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present mar",
            "pulse indicator",
            "protocol h2",
            "value",
            "variables",
            "waypoint object",
            "gsqueue",
            "isotope",
            "hostnames",
            "ice fog",
            "maltiverse top",
            "financial",
            "as62597 nsone",
            "sec ch",
            "domains show",
            "entries",
            "as14720 gamma",
            "canada unknown",
            "as397241",
            "as13335",
            "applicunwnt",
            "xrat",
            "maltiverse safe",
            "aig",
            "soc",
            "hallrender",
            "brian sabey",
            "mark brian sabey",
            "sabey",
            "mark",
            "sabey",
            "data center",
            "malvertizing",
            "malware host",
            "scanning host",
            "botnetwork",
            "colorado",
            "edsaid",
            "geotracking",
            "satellite tracking",
            "radar tracking",
            "pornhub",
            "child teen content illegal",
            "social engineering",
            "cyber stalking",
            "CVE-2023-4966",
            "device control",
            "camera usage",
            "hidden users",
            "message interception",
            "text archiver",
            "mail collection",
            "remote attacks",
            "js",
            "python",
            "inject",
            "sql",
            "extraction",
            "AIG Claims",
            "hallrender.com",
            "soc",
            "milemighmedia",
            "westlaw",
            "revengeporn",
            "bot",
            "regex",
            "ai",
            "yandex"
          ],
          "references": [
            "web2.westlaw.com    (redirects to thbrzzrstr.me)",
            "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
            "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
            "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
            "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
            "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Malware Host: HallRender.com",
            "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
            "safebae.org",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
            "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "Poemhunter.com + rally point.com = pornhub.dev",
            "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
            "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
            "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
            "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://matrix.pornhub.dev",
            "nr-data.net",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
            "https://apple.pantion.top/",
            "newrelic.se",
            "user-apple.info",
            "appleid-comloginaccount.info",
            "init-p01st.push.apple.com",
            "boostmobile.com",
            "www.metrobyt-mobile.com",
            "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
            "https://b.link/infringement",
            "my.mintmobile.com",
            "CVE-2023-4966",
            "http://watchhers.net/index.php",
            "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Spain",
            "Netherlands",
            "Canada",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1427",
              "name": "Attack PC via USB Connection",
              "display_name": "T1427 - Attack PC via USB Connection"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1173",
              "name": "Dynamic Data Exchange",
              "display_name": "T1173 - Dynamic Data Exchange"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654971c396ca4306a6534b12",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4091,
            "hostname": 2422,
            "URL": 3167,
            "FileHash-MD5": 1424,
            "FileHash-SHA1": 983,
            "FileHash-SHA256": 3174,
            "CVE": 10,
            "email": 25
          },
          "indicator_count": 15296,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "591 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669ee58a95337067cacd8316",
          "name": "InQuest - 22-07-2024",
          "description": "",
          "modified": "2024-08-21T23:02:06.560000",
          "created": "2024-07-22T23:04:42.168000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 48,
            "hostname": 53,
            "URL": 193,
            "domain": 4
          },
          "indicator_count": 304,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1603,
          "modified_text": "605 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669d9437679997a2b80d55c6",
          "name": "InQuest - 21-07-2024",
          "description": "",
          "modified": "2024-08-20T23:03:18.426000",
          "created": "2024-07-21T23:05:27.136000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 48,
            "hostname": 53,
            "URL": 193,
            "domain": 4
          },
          "indicator_count": 304,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1603,
          "modified_text": "606 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669c42e7c9eaf196ff9c19c9",
          "name": "InQuest - 20-07-2024",
          "description": "",
          "modified": "2024-08-19T23:00:37.357000",
          "created": "2024-07-20T23:06:15.359000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 48,
            "hostname": 53,
            "URL": 193,
            "domain": 4
          },
          "indicator_count": 304,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "607 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669af15c05e0dbc244b40746",
          "name": "InQuest - 19-07-2024",
          "description": "",
          "modified": "2024-08-18T23:06:34.363000",
          "created": "2024-07-19T23:06:04.410000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 48,
            "hostname": 53,
            "URL": 193,
            "domain": 4
          },
          "indicator_count": 304,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "608 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6699a0d96bb8ddbe0c161507",
          "name": "InQuest - 18-07-2024",
          "description": "",
          "modified": "2024-08-17T23:04:21.565000",
          "created": "2024-07-18T23:10:17.753000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 32,
            "URL": 156,
            "FileHash-MD5": 29,
            "FileHash-SHA256": 2,
            "FileHash-SHA1": 6,
            "domain": 1
          },
          "indicator_count": 226,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "609 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6696fdc550416698dee3cf91",
          "name": "InQuest - 16-07-2024",
          "description": "",
          "modified": "2024-08-15T23:03:32.764000",
          "created": "2024-07-16T23:09:56.812000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 34,
            "URL": 164,
            "domain": 7,
            "FileHash-SHA256": 7,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 17
          },
          "indicator_count": 235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "611 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6695abe0e0a6187859126b0a",
          "name": "InQuest - 15-07-2024",
          "description": "",
          "modified": "2024-08-14T23:00:18.722000",
          "created": "2024-07-15T23:08:16.301000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 255,
            "domain": 3,
            "hostname": 50,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 6
          },
          "indicator_count": 355,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "612 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66945aeed04179e834fa143f",
          "name": "InQuest - 14-07-2024",
          "description": "",
          "modified": "2024-08-13T23:03:40.685000",
          "created": "2024-07-14T23:10:38.072000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 183,
            "domain": 6,
            "hostname": 30,
            "FileHash-SHA256": 1,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 25
          },
          "indicator_count": 251,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "613 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669307518e9dbda4a3ad29a0",
          "name": "InQuest - 13-07-2024",
          "description": "",
          "modified": "2024-08-12T23:00:18.687000",
          "created": "2024-07-13T23:01:37.502000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 57,
            "URL": 236,
            "domain": 6,
            "FileHash-MD5": 50,
            "FileHash-SHA256": 1,
            "FileHash-SHA1": 6
          },
          "indicator_count": 356,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "614 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6691b6f854204077e7673993",
          "name": "InQuest - 12-07-2024",
          "description": "",
          "modified": "2024-08-11T23:04:05.117000",
          "created": "2024-07-12T23:06:32.251000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 238,
            "hostname": 62,
            "domain": 6,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 42
          },
          "indicator_count": 354,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "615 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6690666b33459ffdaae4fbb3",
          "name": "InQuest - 11-07-2024",
          "description": "",
          "modified": "2024-08-10T23:03:27.119000",
          "created": "2024-07-11T23:10:35.390000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 168,
            "hostname": 34,
            "domain": 6,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 29
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "616 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668f1514c0e3118d5a3b1c1d",
          "name": "InQuest - 10-07-2024",
          "description": "",
          "modified": "2024-08-09T23:10:32.796000",
          "created": "2024-07-10T23:11:16.017000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 36,
            "URL": 171,
            "domain": 3,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 28
          },
          "indicator_count": 244,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "617 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668dc3960fa983d4208ea66a",
          "name": "InQuest - 09-07-2024",
          "description": "",
          "modified": "2024-08-08T23:00:27.177000",
          "created": "2024-07-09T23:11:18.699000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 159,
            "FileHash-SHA256": 2,
            "FileHash-MD5": 32,
            "hostname": 34,
            "FileHash-SHA1": 7,
            "domain": 1
          },
          "indicator_count": 235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "618 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668c72322c9e53f441949f6c",
          "name": "InQuest - 08-07-2024",
          "description": "",
          "modified": "2024-08-07T23:00:36.671000",
          "created": "2024-07-08T23:11:46.348000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 197,
            "hostname": 34,
            "domain": 3,
            "FileHash-SHA256": 7,
            "FileHash-MD5": 21,
            "FileHash-SHA1": 6
          },
          "indicator_count": 268,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "619 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668b20a741aa3637fd8e1df1",
          "name": "InQuest - 07-07-2024",
          "description": "",
          "modified": "2024-08-06T23:01:42.804000",
          "created": "2024-07-07T23:11:35.964000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 197,
            "hostname": 34,
            "domain": 3,
            "FileHash-SHA256": 7,
            "FileHash-MD5": 21,
            "FileHash-SHA1": 6
          },
          "indicator_count": 268,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "620 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6689cf2fb1ab0c1c5a7d2022",
          "name": "InQuest - 06-07-2024",
          "description": "",
          "modified": "2024-08-05T23:02:24.366000",
          "created": "2024-07-06T23:11:43.824000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 197,
            "hostname": 34,
            "domain": 3,
            "FileHash-SHA256": 7,
            "FileHash-MD5": 21,
            "FileHash-SHA1": 6
          },
          "indicator_count": 268,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "621 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66887db7b10821a7f4b99da7",
          "name": "InQuest - 05-07-2024",
          "description": "",
          "modified": "2024-08-04T23:04:48.069000",
          "created": "2024-07-05T23:11:51.281000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 197,
            "hostname": 34,
            "domain": 3,
            "FileHash-SHA256": 7,
            "FileHash-MD5": 21,
            "FileHash-SHA1": 6
          },
          "indicator_count": 268,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "622 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66872b0745ee6f948f30f2bb",
          "name": "InQuest - 04-07-2024",
          "description": "",
          "modified": "2024-08-03T23:00:03.286000",
          "created": "2024-07-04T23:06:47.442000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 208,
            "hostname": 50,
            "domain": 4,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 42
          },
          "indicator_count": 310,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "623 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6685d9bbf9a949ef7c6361eb",
          "name": "InQuest - 03-07-2024",
          "description": "",
          "modified": "2024-08-02T23:02:51.268000",
          "created": "2024-07-03T23:07:39.605000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 224,
            "domain": 12,
            "FileHash-MD5": 43,
            "hostname": 55,
            "FileHash-SHA256": 1,
            "FileHash-SHA1": 6
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "624 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6684885b80936c717ddb03bf",
          "name": "InQuest - 02-07-2024",
          "description": "",
          "modified": "2024-08-01T23:05:00.895000",
          "created": "2024-07-02T23:08:11.704000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 45,
            "hostname": 51,
            "URL": 198,
            "FileHash-SHA256": 3,
            "domain": 4,
            "FileHash-SHA1": 6
          },
          "indicator_count": 307,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "625 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6683366b34d09588908eefd1",
          "name": "InQuest - 01-07-2024",
          "description": "",
          "modified": "2024-07-31T23:02:13.281000",
          "created": "2024-07-01T23:06:19.247000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 42,
            "hostname": 74,
            "URL": 289,
            "domain": 4
          },
          "indicator_count": 415,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "626 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6681e508cb0297fbdff647f3",
          "name": "InQuest - 30-06-2024",
          "description": "",
          "modified": "2024-07-30T23:00:22.594000",
          "created": "2024-06-30T23:06:48.595000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "627 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668093546a842adbcf3567cd",
          "name": "InQuest - 29-06-2024",
          "description": "",
          "modified": "2024-07-29T23:03:11.089000",
          "created": "2024-06-29T23:05:56.662000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 47,
            "hostname": 56,
            "URL": 183,
            "domain": 3
          },
          "indicator_count": 295,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "628 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "667f41be14ba1aa22c4329d2",
          "name": "InQuest - 28-06-2024",
          "description": "",
          "modified": "2024-07-28T23:00:54.190000",
          "created": "2024-06-28T23:05:34.553000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "629 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "667df07ddc0b63e755931298",
          "name": "InQuest - 27-06-2024",
          "description": "",
          "modified": "2024-07-27T23:02:29.208000",
          "created": "2024-06-27T23:06:37.821000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 11,
            "URL": 146,
            "FileHash-MD5": 39,
            "hostname": 36,
            "FileHash-SHA1": 6
          },
          "indicator_count": 238,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1603,
          "modified_text": "630 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "667c9f5cdd5004315275c6e0",
          "name": "InQuest - 26-06-2024",
          "description": "",
          "modified": "2024-07-26T23:01:39.013000",
          "created": "2024-06-26T23:08:12.223000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 6,
            "URL": 192,
            "FileHash-SHA256": 2,
            "hostname": 53,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 42
          },
          "indicator_count": 301,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1603,
          "modified_text": "631 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "667b4e5151f1bcc6e35118da",
          "name": "InQuest - 25-06-2024",
          "description": "",
          "modified": "2024-07-25T23:00:30.493000",
          "created": "2024-06-25T23:10:09.461000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 157,
            "domain": 2,
            "FileHash-SHA256": 1,
            "FileHash-SHA1": 6,
            "FileHash-MD5": 38,
            "hostname": 31
          },
          "indicator_count": 235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "632 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6679fbf096178454cef4d3fd",
          "name": "InQuest - 24-06-2024",
          "description": "",
          "modified": "2024-07-24T23:01:09",
          "created": "2024-06-24T23:06:24.480000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 47,
            "hostname": 56,
            "URL": 183,
            "domain": 3
          },
          "indicator_count": 295,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "633 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6678aa5205379179e958a95b",
          "name": "InQuest - 23-06-2024",
          "description": "",
          "modified": "2024-07-23T23:03:06.062000",
          "created": "2024-06-23T23:05:54.474000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "634 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "667758c59fa7b80115cc4e3b",
          "name": "InQuest - 22-06-2024",
          "description": "",
          "modified": "2024-07-22T23:00:36.505000",
          "created": "2024-06-22T23:05:41.075000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "635 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6672131540d0fe5a01d4a8f0",
          "name": "InQuest - 18-06-2024",
          "description": "",
          "modified": "2024-07-18T23:02:18.921000",
          "created": "2024-06-18T23:07:01.953000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 47,
            "hostname": 56,
            "URL": 183,
            "domain": 3
          },
          "indicator_count": 295,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1603,
          "modified_text": "639 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666f70031ca2a7dfa249bc01",
          "name": "InQuest - 16-06-2024",
          "description": "",
          "modified": "2024-07-16T23:04:58.035000",
          "created": "2024-06-16T23:06:43.214000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "641 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666e1e89dd09862675d3b345",
          "name": "InQuest - 15-06-2024",
          "description": "",
          "modified": "2024-07-15T23:02:08.768000",
          "created": "2024-06-15T23:06:48.998000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 6,
            "FileHash-MD5": 52,
            "hostname": 53,
            "URL": 191,
            "domain": 4
          },
          "indicator_count": 306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "642 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
        "wwwwww.publicpublicwww.portal.apple-apple-number3.ipv64.net",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "https://www.virustotal.com/gui/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "$ is funneled back to government, (quasi) , bonused \u2018doctors\u2019 State \u2018experts\u2019  who\u2026",
        "https://hybrid-analysis.com/sample/00f5292bbe68d9edc68f9a22a750eafb58e4f8474e15a48e3cc217fbbd0cdef9/690e24bb39c801e6d80a824e",
        "init-p01st.push.apple.com",
        "http://www.xonitec.com/pornosu/yuotubesex.html",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "There are absolute losers in the dole  illegally benefiting from the suffering others.",
        "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://matrix.pornhub.dev",
        "http://svc.ghlink.com/svc/Authenticate/Applications",
        "https://sap.dswd.gov.ph.index.ph \u2022 login.prod.siecm.gov.mg \u2022 nre-362.dev.nre.gss.gov.uk",
        "newrelic.se",
        "root-dns.netcup",
        "3ddruck-celle.de",
        "Premise liability covers premises, employees and premises visitors. Weaponizing is not covered.",
        "https://hybrid-analysis.com/sample/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce/6889105954703efa4303f7c7",
        "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "boostmobile.com",
        "CVE-2023-4966",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
        "\u2026lie about the severity of injuries and do crap like this.",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "https://polyswarm.network/scan/results/file/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce",
        "https://tria.ge/250729-wr59yabk7y/behavioral2",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
        "https://www.virustotal.com/gui/file-analysis/MTllN2NiNTVkMGQ1MTYzNGY0OTg4MGY2MmRiYmNjYzg6MTc1MzgxNDIzNQ==",
        "https://vtbehaviour.commondatastorage.googleapis.com/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1753815427&Signature=BM1MWONwwKd011yMi5XzJJHo01QYs0qWdERlFPM9BGS4OW62YRzI4FX6aMwA6MgQB2eLDnMBjwIYw2ct1yC2HAzJ82eh6VqtBu%2BiE6lObCQjjON9nx29EKx9dGSRLewI3Zjpp7Kbokc%2FIKEh40ZNmeXNc4aCsECY%2Fwq9FQOmT2vm8Bi6IHzZNBMT3srLRZsr%2Bo36MP6ckdybeglLLnb9LA5iEOYbMBMEq6HxMj%2BfLIssDjKInHz7",
        "https://cullenbehavioralhealth.theraplatform.com/ \u2022 amghealthnetwork.com",
        "device-*******-*****-****-****-*********.remotewd.com",
        "www.metrobyt-mobile.com",
        "https://www.filescan.io/uploads/68890e2dc79df08ef097cd38/reports/06923db6-30ae-455f-8026-73461cc1472e/overview",
        "Domain Name: schroederdennis.de | Status: connect",
        "Those attacked are the severely injured, survivors of dead workers, victims of providers.",
        "\u2022 http://demo.ideaboxthemes.com/prism",
        "ai-sandboxes.com",
        "https://app.threat.zone/submission/5879c4fe-ce35-45c3-8a3c-e8c06d0e2b2d/overview",
        "T1110.001 (Brute Force: Password Guessing)",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "remote.tecbuddy.de | remote.schneider-hv.de | remotedesktop.thedipling",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
        "appleid-comloginaccount.info",
        "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
        "safebae.org",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "sdp-dev-ingest.ci.lineageandprovenance.gss.gov.uk",
        "www.ventoxhealthcare.in \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk",
        "rowanandbenporn.ssssssssssssshadow.home64.de",
        "https://labs.inquest.net/iocdb",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
        "nr-data.net",
        "\"OC47TWOY.txt\" has type \"ASCII text\"- [targetUID: N/A] \"spyglass-w_1_.png\" has type \"Unknown\"- [targetUID: N/A]",
        "\"spyglass-w_1_.png\" has type \"Unknown\" and extension \"png\" \"clock-g_1_.png\" has type \"Unknown\" and extension \"png\"",
        "https://b.link/infringement",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "Why Is this always a problem? Just curious. - http://wyblog.us/blog/rants/strikers-get-unemployment-benefits",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset.",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://tip.neiki.dev/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "photoprism.thedipling.dns64.de \u2022  https://schroederdennis.de/wp-content/plugins/highlighting-code-block/assets/js/prism.js?ver=2.0.1",
        "Poemhunter.com + rally point.com = pornhub.dev",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "https://malpedia.caad.fkie.fraunhofer.de/actor/callisto",
        "https://apple.pantion.top/",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "Malware Host: HallRender.com",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
        "my.mintmobile.com",
        "http://watchhers.net/index.php",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "These people aren\u2019t in the dark. They are clear of the need to pay benefits.",
        "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
        "https://pagead2.googlesyndication.com/pagead/ads?ltd_cs=1&client=ca-pub-6165363645315831&output=html&adk=1812271804&adf=3025194257&lmt=1713778114&plat=3%3A16%2C4%3A16%2C8%3A4194304%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=https%3A%2F%2Fschroederdennis.de%2Fubiquiti%2Fubiquiti-unifi-u6-plus-vs-u6-lite-vergleich-access-point-wifi%2F&pra=5&wgl=1&easpi=0&asro=0&uach=WyJXaW4zMiIsIjEwLjAuMCIsIng4NiIsIiIsIjEyNC4wLjYzNjcuNjAiLG51bGwsMCx",
        "https://urlscan.io/result/019a5fbd-e7c6-743a-b9a7-a20e8b2943cd/",
        "Domain healthcareshapers.com \u2022  https://www.healthcareshapers.com/",
        "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
        "user-apple.info",
        "https://hybrid-analysis.com/sample/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
        "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
        "https://metadefender.com/results/file/YTI1MDcyOXl4LTdxa1I5ZlVJNGVsWTRUS2kz_mdaas",
        "sonarr.app.pineapplegod.co.nz",
        "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A",
        "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "This money belongs to people who paid  insurance to cover on job  injuries that happen in the job.",
        "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
        "web2.westlaw.com    (redirects to thbrzzrstr.me)",
        "https://photoprism.thedipling.dns64.de/ \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"
          ],
          "malware_families": [
            "Malware family: stealthworker / gobrut",
            "Win.packed.rrat-9798963-0",
            "Md5 hash: f8add7e7161460ea2b1970cf4ca535bf",
            "Malware packed",
            "Et",
            "Win.dropper.limerat-9776087-0",
            "Trojanspy",
            "Maltiverse",
            "Mal_pdf_calisto_pdf_streams_jul_09",
            "Webtoolbar",
            "Tsara brashears",
            "Mitre attack",
            "Beach research",
            "Radar ineractive"
          ],
          "industries": [
            "Government",
            "Education",
            "Technology",
            "Legal",
            "Healthcare"
          ],
          "unique_indicators": 61116
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/gstatic.com",
    "whois": "http://whois.domaintools.com/gstatic.com",
    "domain": "gstatic.com",
    "hostname": "ssl.gstatic.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69b283a733a36fe75a38bb9c",
      "name": "The Gatby Script Loader",
      "description": "Im still hooked on the Belasco Chain being a thing.",
      "modified": "2026-04-18T05:29:25.398000",
      "created": "2026-03-12T09:13:11.392000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 227,
        "FileHash-MD5": 24,
        "FileHash-SHA1": 14,
        "domain": 64,
        "URL": 42,
        "hostname": 57,
        "CVE": 3,
        "IPv4": 1,
        "JA3": 1
      },
      "indicator_count": 433,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b7d96dfe022e3e33d347a2",
      "name": "CAPE Sandbox - \"undefined\"",
      "description": "",
      "modified": "2026-04-15T10:12:27.063000",
      "created": "2026-03-16T10:20:29.311000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 5,
        "FileHash-SHA1": 6,
        "FileHash-SHA256": 9,
        "domain": 24,
        "hostname": 112,
        "URL": 161,
        "CIDR": 9,
        "email": 2
      },
      "indicator_count": 328,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b786ef253f307468ab0d63",
      "name": "Project",
      "description": "Pulses, also known as Pulse.org, are being used to track users' activity on the internet and send emails to a website owned by GoDaddy.com, the company that owns the domain. <-- pretext not my thoughts but interesting and not my take though infra I suspect is targeted for geofencing and other abuse. researchers remain vigilint on infra",
      "modified": "2026-04-15T04:08:56.830000",
      "created": "2026-03-16T04:28:31.032000",
      "tags": [
        "united",
        "unknown",
        "as54113",
        "date",
        "aaaa",
        "status",
        "cname",
        "as44273 host",
        "moved",
        "passive dns",
        "title",
        "body",
        "encrypt"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 350,
        "FileHash-SHA1": 5,
        "domain": 501,
        "hostname": 1851,
        "email": 7,
        "CIDR": 6,
        "FileHash-SHA256": 8,
        "CVE": 1,
        "FileHash-MD5": 2
      },
      "indicator_count": 2731,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6992bae83a5988dff8311490",
      "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
      "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
      "modified": "2026-04-13T23:46:20.071000",
      "created": "2026-02-16T06:36:24.788000",
      "tags": [
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
        "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
        "#PotentialUS-Origin_FalseFlag_Obfuscation"
      ],
      "references": [
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
      ],
      "public": 1,
      "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware Family: StealthWorker / GoBrut",
          "display_name": "Malware Family: StealthWorker / GoBrut",
          "target": "/malware/Malware Family: StealthWorker / GoBrut"
        },
        {
          "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2166,
        "FileHash-SHA1": 2067,
        "FileHash-SHA256": 3371,
        "domain": 13295,
        "URL": 6860,
        "email": 272,
        "hostname": 4705,
        "SSLCertFingerprint": 268,
        "CVE": 107,
        "CIDR": 6
      },
      "indicator_count": 33117,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 62,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69abd3a39b21902d77003ccb",
      "name": "domain iocs LI",
      "description": "Details and details of a malicious web address found in the linkedin.com community:-1-2-3-7-28 February 2017, and here is the full set of details.",
      "modified": "2026-04-06T08:01:04.640000",
      "created": "2026-03-07T07:28:35.218000",
      "tags": [
        "secure",
        "httponly",
        "path",
        "submission",
        "samesitenone",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "body",
        "title",
        "enjoy",
        "pragma",
        "date",
        "cloud"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 16,
        "FileHash-SHA1": 5,
        "FileHash-SHA256": 26,
        "URL": 180,
        "domain": 32,
        "hostname": 126,
        "email": 2
      },
      "indicator_count": 387,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "13 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ca3c8885ac1cb3171429a3",
      "name": "Untitled.",
      "description": "A full report on Google's security system, based on data gathered from 1,000 of its users' accounts, has been published by the Google Research Institute (GPRI) in the US.",
      "modified": "2026-03-31T21:23:41.012000",
      "created": "2026-03-30T09:04:08.040000",
      "tags": [
        "log id",
        "gmtn",
        "google trust",
        "ca issuers",
        "b0n timestamp",
        "pulse pulses",
        "http",
        "pulses otx",
        "pulses",
        "related tags",
        "false",
        "url https",
        "hostname",
        "filehashsha256",
        "source url"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 379,
        "FileHash-SHA256": 156,
        "SSLCertFingerprint": 2,
        "domain": 32,
        "hostname": 144,
        "IPv4": 52,
        "URL": 115,
        "FileHash-SHA1": 130
      },
      "indicator_count": 1010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ca3c89851a1aa0bf0185ff",
      "name": "Untitled.",
      "description": "A full report on Google's security system, based on data gathered from 1,000 of its users' accounts, has been published by the Google Research Institute (GPRI) in the US.",
      "modified": "2026-03-31T09:12:52.080000",
      "created": "2026-03-30T09:04:09.024000",
      "tags": [
        "log id",
        "gmtn",
        "google trust",
        "ca issuers",
        "b0n timestamp",
        "pulse pulses",
        "http",
        "pulses otx",
        "pulses",
        "related tags",
        "false",
        "url https",
        "hostname",
        "filehashsha256",
        "source url"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 118,
        "FileHash-SHA256": 166,
        "SSLCertFingerprint": 6,
        "domain": 68,
        "hostname": 90,
        "IPv4": 9,
        "URL": 118,
        "FileHash-SHA1": 106,
        "email": 1
      },
      "indicator_count": 682,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "19 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "690e47a694d9bc5c12d83bc0",
      "name": "LimeRAT | Dark Room Dennis | SpyGlassPrism HealthCare",
      "description": "Invasive, dark , illegal. Malicious. Will sift through malware Spyware systems. Perpetual remote connections.  Employed by Tam Legals Christopher P. Ahmann (Colorado government) to spy on, tamper with , annoy, terrorize, out of financial awards. \n\n spyglass-w_1_.png\n\nSize\n362B (362 bytes)\nMD5\n3c0e6546a44bd9a0f2768df07db5c1c9  Copy MD5 to clipboard\nSHA1\neddf26d1da4a140f2f963b8564c4e99cd6f1a677  Copy SHA1 to clipboard\nSHA256\n83eec393865a35363695d6f2416792d0117f551bb3e41d13b141d70e6b35e02c  Copy SHA256 to clipboard",
      "modified": "2025-12-07T18:01:48.980000",
      "created": "2025-11-07T19:25:26.827000",
      "tags": [
        "germany asn",
        "as24940 hetzner",
        "status connect",
        "associated",
        "present nov",
        "germany",
        "moved",
        "present oct",
        "accept",
        "germany unknown",
        "web trebuchet",
        "ms lucida",
        "grande lucida",
        "sans unicode",
        "lucida sans",
        "tahoma",
        "passive dns",
        "title",
        "error",
        "gmbh ccp",
        "germany germany",
        "asn as197540",
        "response ip",
        "address google",
        "safe browsing",
        "present jun",
        "present may",
        "present mar",
        "present jan",
        "urls",
        "aaaa",
        "gmt content",
        "type",
        "tags",
        "tag groups",
        "countries",
        "add country",
        "malware att",
        "ck it1140",
        "information",
        "cisco",
        "umbrella rank",
        "automatic",
        "webgl",
        "please",
        "november",
        "typeof function",
        "topropertykey",
        "masonry object",
        "prism function",
        "cookies",
        "source level",
        "reverse dns",
        "protocol h2",
        "security tls",
        "asn24940",
        "online gmbh",
        "general full",
        "url https",
        "falkenstein",
        "community forum",
        "it url",
        "youtube videos",
        "twitch kanal",
        "discord channel",
        "spenden",
        "shop url",
        "google",
        "hetzneras",
        "http",
        "april",
        "de summary",
        "ehingen",
        "march",
        "google safe",
        "browsing",
        "learn",
        "issues tab",
        "value",
        "masonry",
        "domainpath name",
        "cgjerrieegagfw",
        "label",
        "input",
        "suchen nach",
        "suche",
        "form",
        "hash",
        "name value",
        "main",
        "flag",
        "contacted hosts",
        "ip address",
        "process details",
        "windir",
        "openurl c",
        "prefetch2",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "a domains",
        "ascio",
        "china unknown",
        "record value",
        "apache",
        "encrypt",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "related pulses",
        "related tags",
        "certificate",
        "hostname add",
        "url analysis",
        "files",
        "domain",
        "files ip",
        "address",
        "asn as24940",
        "less",
        "raspberry pi",
        "ubiquiti",
        "remote",
        "hostname",
        "pulse submit",
        "status",
        "entries",
        "x xss",
        "sameorigin x",
        "unicode text",
        "utf8 text",
        "click",
        "strings",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "href",
        "show process",
        "network traffic",
        "general",
        "hybrid",
        "local",
        "path",
        "monitored target",
        "spyglass",
        "spyware.",
        "pegasus systems",
        "prism",
        "colorado leg",
        "christopher p.ahmann",
        "ahmann",
        "christopher",
        "P",
        "tam legal",
        "treece",
        "alfrey",
        "muscat",
        "criminal",
        "jeffrey reimer",
        "theft",
        "remote connect",
        "schroeder dennis"
      ],
      "references": [
        "Domain Name: schroederdennis.de | Status: connect",
        "remote.tecbuddy.de | remote.schneider-hv.de | remotedesktop.thedipling",
        "root-dns.netcup",
        "device-*******-*****-****-****-*********.remotewd.com",
        "ai-sandboxes.com",
        "Why Is this always a problem? Just curious. - http://wyblog.us/blog/rants/strikers-get-unemployment-benefits",
        "$ is funneled back to government, (quasi) , bonused \u2018doctors\u2019 State \u2018experts\u2019  who\u2026",
        "\u2026lie about the severity of injuries and do crap like this.",
        "This money belongs to people who paid  insurance to cover on job  injuries that happen in the job.",
        "Premise liability covers premises, employees and premises visitors. Weaponizing is not covered.",
        "Those attacked are the severely injured, survivors of dead workers, victims of providers.",
        "These people aren\u2019t in the dark. They are clear of the need to pay benefits.",
        "There are absolute losers in the dole  illegally benefiting from the suffering others.",
        "https://hybrid-analysis.com/sample/00f5292bbe68d9edc68f9a22a750eafb58e4f8474e15a48e3cc217fbbd0cdef9/690e24bb39c801e6d80a824e",
        "\u2022 http://demo.ideaboxthemes.com/prism",
        "https://photoprism.thedipling.dns64.de/ \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk",
        "photoprism.thedipling.dns64.de \u2022  https://schroederdennis.de/wp-content/plugins/highlighting-code-block/assets/js/prism.js?ver=2.0.1",
        "\"OC47TWOY.txt\" has type \"ASCII text\"- [targetUID: N/A] \"spyglass-w_1_.png\" has type \"Unknown\"- [targetUID: N/A]",
        "\"spyglass-w_1_.png\" has type \"Unknown\" and extension \"png\" \"clock-g_1_.png\" has type \"Unknown\" and extension \"png\"",
        "Domain healthcareshapers.com \u2022  https://www.healthcareshapers.com/",
        "www.ventoxhealthcare.in \u2022 synertec-audit-cloud.healthchecks.prismcloud.uk",
        "https://cullenbehavioralhealth.theraplatform.com/ \u2022 amghealthnetwork.com",
        "3ddruck-celle.de",
        "wwwwww.publicpublicwww.portal.apple-apple-number3.ipv64.net",
        "sonarr.app.pineapplegod.co.nz",
        "http://svc.ghlink.com/svc/Authenticate/Applications",
        "https://sap.dswd.gov.ph.index.ph \u2022 login.prod.siecm.gov.mg \u2022 nre-362.dev.nre.gss.gov.uk",
        "sdp-dev-ingest.ci.lineageandprovenance.gss.gov.uk",
        "http://www.xonitec.com/pornosu/yuotubesex.html",
        "rowanandbenporn.ssssssssssssshadow.home64.de",
        "https://pagead2.googlesyndication.com/pagead/ads?ltd_cs=1&client=ca-pub-6165363645315831&output=html&adk=1812271804&adf=3025194257&lmt=1713778114&plat=3%3A16%2C4%3A16%2C8%3A4194304%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=https%3A%2F%2Fschroederdennis.de%2Fubiquiti%2Fubiquiti-unifi-u6-plus-vs-u6-lite-vergleich-access-point-wifi%2F&pra=5&wgl=1&easpi=0&asro=0&uach=WyJXaW4zMiIsIjEwLjAuMCIsIng4NiIsIiIsIjEyNC4wLjYzNjcuNjAiLG51bGwsMCx",
        "https://urlscan.io/result/019a5fbd-e7c6-743a-b9a7-a20e8b2943cd/",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Packed.Rrat-9798963-0",
          "display_name": "Win.Packed.Rrat-9798963-0",
          "target": null
        },
        {
          "id": "Win.Dropper.LimeRAT-9776087-0",
          "display_name": "Win.Dropper.LimeRAT-9776087-0",
          "target": null
        },
        {
          "id": "Malware Packed",
          "display_name": "Malware Packed",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [
        "Healthcare",
        "Legal",
        "Government",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1258,
        "hostname": 2018,
        "URL": 3033,
        "FileHash-SHA256": 651,
        "email": 4,
        "FileHash-MD5": 62,
        "FileHash-SHA1": 69,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 7100,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "133 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6916d97edb28b2616ffac3ab",
      "name": "njRAT| BazarLoader| Darkside 2020 .Beware \u2022 WebToolbar \u2022 Qbot",
      "description": "",
      "modified": "2025-11-14T07:41:19.912000",
      "created": "2025-11-14T07:25:50.524000",
      "tags": [
        "whois record",
        "ssl certificate",
        "historical ssl",
        "resolutions",
        "referrer",
        "communicating",
        "subdomains",
        "domains",
        "problems",
        "urls http",
        "ransomware",
        "malware",
        "contacted",
        "dropped",
        "execution",
        "tsara brashears",
        "apple ios",
        "whois whois",
        "unlocker",
        "njrat",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "awful",
        "open",
        "banker",
        "keylogger",
        "malicious",
        "tofsee",
        "mitre attack",
        "et",
        "cisco umbrella",
        "internet storm",
        "site",
        "covid19",
        "cyber threat",
        "safe site",
        "cobalt strike",
        "malicious url",
        "alexa",
        "script urls",
        "united",
        "a domains",
        "as396982 google",
        "as15169 google",
        "search",
        "cname",
        "accept encoding",
        "showing",
        "unknown",
        "date",
        "body",
        "meta",
        "encrypt",
        "domain related",
        "as396982",
        "creation date",
        "expiration date",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "next",
        "all search",
        "otx octoseek",
        "as7922 comcast",
        "as16276",
        "as54113",
        "aaaa",
        "france unknown",
        "as14061",
        "status",
        "as40509",
        "ip address",
        "for privacy",
        "as44273 host",
        "record value",
        "certificate",
        "gmt content",
        "x sucuri",
        "as8075",
        "nxdomain",
        "as30148 sucuri",
        "as20940",
        "as31898 oracle",
        "hong kong",
        "as139021",
        "msie",
        "chrome",
        "ipv4",
        "blacklist http",
        "detection list",
        "blacklist",
        "files",
        "location hong",
        "kong asn",
        "tags none",
        "indicator facts",
        "name verdict",
        "falcon sandbox",
        "mail spammer",
        "tor known",
        "tor relayrouter",
        "exit",
        "node tcp",
        "traffic",
        "heur",
        "malicious site",
        "alexa top",
        "million",
        "alexa proxy",
        "outbreak",
        "installcore",
        "acint",
        "conduit",
        "installpack",
        "iobit",
        "artemis",
        "dropper",
        "mediaget",
        "crack",
        "spammer",
        "france mail",
        "summary",
        "url summary",
        "phishing",
        "union",
        "team",
        "bank",
        "unsafe",
        "threat report",
        "ip summary",
        "pattern match",
        "script",
        "et tor",
        "known tor",
        "relayrouter",
        "node traffic",
        "misc attack",
        "beginstring",
        "null",
        "error",
        "span",
        "class",
        "generator",
        "refresh",
        "tools",
        "hybrid",
        "general",
        "click",
        "strings",
        "servers",
        "ps ord",
        "name servers",
        "poetry",
        "moved",
        "content length",
        "content type",
        "x powered",
        "poems",
        "poem",
        "topic",
        "topics",
        "poem topics",
        "free poems",
        "love poems",
        "romantic poems",
        "classic poems",
        "friendship poems",
        "shone pale",
        "herself",
        "heavens",
        "her beam",
        "a fleecy",
        "proud evening",
        "star",
        "thou bearest",
        "heaven",
        "than",
        "google",
        "http",
        "leasewebuklon11",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "february",
        "gb summary",
        "london",
        "april",
        "screenshot",
        "url https",
        "reverse dns",
        "general full",
        "name value",
        "frankfurt",
        "main",
        "germany",
        "asn15169",
        "resource",
        "hashes",
        "copyright",
        "gmbh version",
        "follow",
        "blacklist https",
        "phishing site",
        "malware site",
        "riskware",
        "opencandy",
        "cleaner",
        "iframe",
        "xtrat",
        "agent",
        "softcnapp",
        "generic",
        "patcher",
        "driverpack",
        "exploit",
        "mimikatz",
        "downldr",
        "presenoker",
        "fusioncore",
        "wacatac",
        "beach research",
        "trojanspy",
        "maltiverse",
        "firehol",
        "proxy",
        "anonymizer",
        "adware",
        "kuaizip",
        "downer",
        "tag count",
        "tue apr",
        "sample",
        "samples",
        "fakealert",
        "genkryptik",
        "icedid",
        "coinminer",
        "nircmd",
        "swrort",
        "systweak",
        "behav",
        "tiggre",
        "filetour",
        "quasar rat",
        "fuery",
        "bazaloader",
        "media",
        "facebook",
        "service",
        "runescape",
        "webtoolbar",
        "a9dia",
        "a1ginaprincipal",
        "emails",
        "registrar",
        "http header",
        "tcp traffic",
        "et useragents",
        "unknown traffic",
        "antivirus",
        "server",
        "gmt united",
        "accept",
        "local",
        "path",
        "falcon",
        "file",
        "ascii text",
        "windows nt",
        "png image",
        "appdata",
        "jpeg image",
        "indicator",
        "twitter",
        "westlaw njrat",
        "zuorat",
        "skynet bot",
        "glupteba",
        "asn4583",
        "thomsonreuters",
        "asn209242",
        "june",
        "back",
        "united kingdom",
        "cisco",
        "umbrella rank",
        "rank",
        "page url",
        "as autonomous",
        "system",
        "yndx",
        "ipasns ip",
        "november",
        "de summary",
        "comodo rsa",
        "security tls",
        "software",
        "resource hash",
        "security",
        "ecdhersa",
        "de indicators",
        "de page",
        "url history",
        "javascript",
        "gts ca",
        "secure server",
        "markmonitor",
        "ip information",
        "detail domains",
        "domain tree",
        "links certs",
        "frames domain",
        "requested",
        "threat roundup",
        "march",
        "threat round",
        "parent parent",
        "roundup",
        "january",
        "threats",
        "qbot",
        "cyberwar",
        "skynet",
        "radar ineractive",
        "control server",
        "engineering",
        "host",
        "services",
        "pony",
        "nanocore rat",
        "meterpreter",
        "zeus",
        "zbot",
        "suppobox",
        "stealer",
        "redline stealer",
        "dnspionage",
        "mirai",
        "nanocore",
        "bradesco",
        "emotet",
        "laplasclipper",
        "asn16276",
        "get h2",
        "kb image",
        "august",
        "kali",
        "localappdata",
        "network traffic",
        "binary file",
        "svg scalable",
        "vector graphics",
        "mwin",
        "domain",
        "url http",
        "pulse pulses",
        "related nids",
        "files location",
        "customer",
        "address",
        "as29789",
        "hosting",
        "location united",
        "status hostname",
        "query type",
        "address first",
        "seen last",
        "seen asn",
        "country unknown",
        "urls date",
        "checked url",
        "hostname server",
        "response ip",
        "address google",
        "safe browsing",
        "present mar",
        "pulse indicator",
        "protocol h2",
        "value",
        "variables",
        "waypoint object",
        "gsqueue",
        "isotope",
        "hostnames",
        "ice fog",
        "maltiverse top",
        "financial",
        "as62597 nsone",
        "sec ch",
        "domains show",
        "entries",
        "as14720 gamma",
        "canada unknown",
        "as397241",
        "as13335",
        "applicunwnt",
        "xrat",
        "maltiverse safe",
        "aig",
        "soc",
        "hallrender",
        "brian sabey",
        "mark brian sabey",
        "sabey",
        "mark",
        "sabey",
        "data center",
        "malvertizing",
        "malware host",
        "scanning host",
        "botnetwork",
        "colorado",
        "edsaid",
        "geotracking",
        "satellite tracking",
        "radar tracking",
        "pornhub",
        "child teen content illegal",
        "social engineering",
        "cyber stalking",
        "CVE-2023-4966",
        "device control",
        "camera usage",
        "hidden users",
        "message interception",
        "text archiver",
        "mail collection",
        "remote attacks",
        "js",
        "python",
        "inject",
        "sql",
        "extraction",
        "AIG Claims",
        "hallrender.com",
        "soc",
        "milemighmedia",
        "westlaw",
        "revengeporn",
        "bot",
        "regex",
        "ai",
        "yandex"
      ],
      "references": [
        "web2.westlaw.com    (redirects to thbrzzrstr.me)",
        "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
        "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
        "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
        "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
        "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "Malware Host: HallRender.com",
        "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
        "safebae.org",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
        "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "Poemhunter.com + rally point.com = pornhub.dev",
        "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
        "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
        "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
        "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://matrix.pornhub.dev",
        "nr-data.net",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
        "https://apple.pantion.top/",
        "newrelic.se",
        "user-apple.info",
        "appleid-comloginaccount.info",
        "init-p01st.push.apple.com",
        "boostmobile.com",
        "www.metrobyt-mobile.com",
        "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
        "https://b.link/infringement",
        "my.mintmobile.com",
        "CVE-2023-4966",
        "http://watchhers.net/index.php",
        "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Spain",
        "Netherlands",
        "Canada",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Mitre Attack",
          "display_name": "Mitre Attack",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Radar Ineractive",
          "display_name": "Radar Ineractive",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1423",
          "name": "Network Service Scanning",
          "display_name": "T1423 - Network Service Scanning"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1563",
          "name": "Remote Service Session Hijacking",
          "display_name": "T1563 - Remote Service Session Hijacking"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1427",
          "name": "Attack PC via USB Connection",
          "display_name": "T1427 - Attack PC via USB Connection"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1173",
          "name": "Dynamic Data Exchange",
          "display_name": "T1173 - Dynamic Data Exchange"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654971c396ca4306a6534b12",
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 4037,
        "hostname": 2241,
        "URL": 2516,
        "FileHash-MD5": 1224,
        "FileHash-SHA1": 783,
        "FileHash-SHA256": 2796,
        "CVE": 10,
        "email": 25
      },
      "indicator_count": 13632,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "156 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6889153bb756c703bd61c97d",
      "name": "Calisto - APT - 07.29.25 - UA ChromeBook Retro",
      "description": "Maldoc Calisto - 03.17.23\nRetroanalysis of a simple test to demonstrate a point (had some extensions to capture data). Borrowed a Google Chromebook From University of Alberta & signed in to my CCID on Campus with the Chromebook provided by Office of DOS (provided to them by 'offside IT'. Chromebook did not do so well. Returned. \n\nMAL_PDF_Calisto_PDF_Streams_Jul_09 (Threatzone)\nThis supports findings from Beehive Security who later blocked Calisto/Callisto with their MDR Solution.",
      "modified": "2025-09-03T00:22:10.750000",
      "created": "2025-07-29T18:38:51.647000",
      "tags": [
        "triage",
        "malware",
        "analysis",
        "report",
        "reported",
        "analyze",
        "sandbox",
        "download submit",
        "sha512",
        "sha1",
        "filesize",
        "sha256",
        "file",
        "token",
        "prefetch8",
        "prefetch1",
        "dataprofile",
        "general",
        "config",
        "download",
        "copy",
        "target",
        "defense",
        "generic",
        "impact",
        "virus",
        "trojan",
        "ransomware",
        "static",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "online",
        "submit",
        "sample",
        "platform",
        "vxstream",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "switch",
        "inquest labs",
        "resources api",
        "notes supported",
        "cve list",
        "drop your",
        "service",
        "privacy policy",
        "found url",
        "ck id",
        "details found",
        "ingress tool",
        "transfer",
        "t1105",
        "details url",
        "t1571",
        "pdf found",
        "found",
        "contentparse",
        "externalparser",
        "woff2",
        "inputfile",
        "domainresolve",
        "u200c200d",
        "u25cc",
        "ioc value",
        "Callisto",
        "Maldoc",
        "UAlberta",
        "U of A",
        "Chromebook",
        "Microsoft",
        "Google",
        "Telus",
        "Calisto",
        "APT"
      ],
      "references": [
        "https://tria.ge/250729-wr59yabk7y/behavioral2",
        "https://www.filescan.io/uploads/68890e2dc79df08ef097cd38/reports/06923db6-30ae-455f-8026-73461cc1472e/overview",
        "https://hybrid-analysis.com/sample/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "https://metadefender.com/results/file/YTI1MDcyOXl4LTdxa1I5ZlVJNGVsWTRUS2kz_mdaas",
        "https://polyswarm.network/scan/results/file/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce",
        "https://app.threat.zone/submission/5879c4fe-ce35-45c3-8a3c-e8c06d0e2b2d/overview",
        "https://tip.neiki.dev/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "https://www.virustotal.com/gui/file/2d0458cbda9297baf3d2f28bfa47a4872075a444ec68f30757ceec458f3aab2e",
        "https://www.virustotal.com/gui/file-analysis/MTllN2NiNTVkMGQ1MTYzNGY0OTg4MGY2MmRiYmNjYzg6MTc1MzgxNDIzNQ==",
        "https://vtbehaviour.commondatastorage.googleapis.com/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1753815427&Signature=BM1MWONwwKd011yMi5XzJJHo01QYs0qWdERlFPM9BGS4OW62YRzI4FX6aMwA6MgQB2eLDnMBjwIYw2ct1yC2HAzJ82eh6VqtBu%2BiE6lObCQjjON9nx29EKx9dGSRLewI3Zjpp7Kbokc%2FIKEh40ZNmeXNc4aCsECY%2Fwq9FQOmT2vm8Bi6IHzZNBMT3srLRZsr%2Bo36MP6ckdybeglLLnb9LA5iEOYbMBMEq6HxMj%2BfLIssDjKInHz7",
        "https://hybrid-analysis.com/sample/4c7d629d37665e74617cefe3e208a37b2042529cbbeb9a839a79e167919561ce/6889105954703efa4303f7c7",
        "https://malpedia.caad.fkie.fraunhofer.de/actor/callisto"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "MAL_PDF_Calisto_PDF_Streams_Jul_09",
          "display_name": "MAL_PDF_Calisto_PDF_Streams_Jul_09",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1217",
          "name": "Browser Bookmark Discovery",
          "display_name": "T1217 - Browser Bookmark Discovery"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        }
      ],
      "industries": [
        "Education",
        "Technology",
        "Healthcare",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6319,
        "CIDR": 11,
        "CVE": 9,
        "FileHash-MD5": 323,
        "FileHash-SHA1": 260,
        "FileHash-SHA256": 292,
        "domain": 596,
        "email": 37,
        "hostname": 806
      },
      "indicator_count": 8653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 131,
      "modified_text": "228 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ssl.gstatic.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ssl.gstatic.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631323.8504686
}