{
  "type": "URL",
  "indicator": "https://ssl.xui.ptlogin2.yixun.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ssl.xui.ptlogin2.yixun.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3948615865,
      "indicator": "https://ssl.xui.ptlogin2.yixun.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "6944ce38344ccded23df66f5",
          "name": "Ransom - Amnesty.org - a single link in a Pegasus attack against a civilian.",
          "description": "I don\u2019t have the right words to put this together because it involves so much coercion, fraud, betrayal, manipulation , hacking, multiple business fronts, loud mouth mafia plants, working with someone under false pretenses, redhat security teams in Denver , Colorado, false implications of cyber attacks coming from foreign entities. \n\nTips come from a highly reliable sources. One link in a Pegasus attack .",
          "modified": "2026-01-18T03:05:59.836000",
          "created": "2025-12-19T04:02:00.973000",
          "tags": [
            "intel",
            "ms windows",
            "write c",
            "pe32",
            "pe32 executable",
            "copy c",
            "free",
            "benjamin",
            "write",
            "worm",
            "win32",
            "code",
            "june",
            "delphi",
            "malware",
            "benjamin",
            "tulach",
            "state of colorado",
            "christopher p. \u2018buzz\u2019 ahmann",
            "danica implants",
            "nids_malware_alert",
            "bonu$",
            "network_icmp",
            "network_irc",
            "persistence_autorun",
            "network_http",
            "nids_alert",
            "allocates_rwx",
            "hackers",
            "creates_exe",
            "brian sabey",
            "sour del",
            "packer_entropy",
            "antivm_memory_available",
            "pe_features",
            "get key",
            "crime",
            "organized crime",
            "federal crime",
            "cyber crime",
            "piracy",
            "status",
            "china unknown",
            "name servers",
            "div div",
            "ip address",
            "domain",
            "creation date",
            "record value",
            "meta",
            "title",
            "hong kong",
            "passive dns",
            "gmt content",
            "type",
            "content length",
            "ipv4 add",
            "urls",
            "files",
            "location hong",
            "twitter",
            "youtube",
            "side 3 studios",
            "denver music",
            "infiltration",
            "whistleblower",
            "getkey",
            "cyber warfare",
            "fraud",
            "financial crimes",
            "pegasus",
            "music front",
            "france unknown",
            "present feb",
            "iran unknown",
            "present nov",
            "present jun",
            "present jan",
            "hidden",
            "present jul",
            "date",
            "united",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "llc name",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "pattern match",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "memory dumping",
            "entries",
            "icmp delphi",
            "showing",
            "delete",
            "yara detections",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "dns query",
            "packing t1045",
            "ransom",
            "cve",
            "palantir",
            "remote",
            "graham"
          ],
          "references": [
            "Amnesty.org | remote.amnesty.org",
            "tulach.cc",
            "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
            "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
            "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
            "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
            "Delphi This program must be run under Win32 Compilers",
            "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
            "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
            "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
            "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
            "ipv4bot.whatismyipaddress.com",
            "helloprismatic.com",
            "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
            "Brian Sabey",
            "Christopher P. \u2018Buzz\u2019 Ahmann"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "Ransom:Win32/GandCrab",
              "display_name": "Ransom:Win32/GandCrab",
              "target": "/malware/Ransom:Win32/GandCrab"
            },
            {
              "id": "CVE-2023-2868",
              "display_name": "CVE-2023-2868",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 429,
            "FileHash-SHA1": 341,
            "FileHash-SHA256": 2766,
            "URL": 6976,
            "domain": 1151,
            "CVE": 2,
            "email": 3,
            "hostname": 2913,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 14585,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "92 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692cb6dc24da17618e3d9da6",
          "name": "Mirai Botnet | HackTool Powershell targets LinkedIn User | 192.168.1.1 \u2022  Remote Inbound Outbound Connection",
          "description": "Linux Malware - LinkedIn- True  Mirai Botnet  (192.168.1.1) (Never Connect) Incredibly powerful attack targeting LinkedIn users. In this instance the target is an ex husband of a target. |\nNDO Group relationships seen. This is a Botnet. \n\nMay be \u2018framing\u2019 attack that was launched in 2014. Attackers sent a clear message to target that she + husband would be arrested and charged with possession of 1000\u2019s of \u2018child pornography\u2019  pictures. \n\nAttack 10/10 malicious. Worked from separate system in separate location. Hackers unlocked a device,  zero clicks, removed PSW. Tulach malware seen a profile \u2018Michael Robert\u2019s of Rexxfield\u2019 may be  entity (NSA) with a face like Tulach. Uses the most WILD compromises. Government contractors? \n\nSame attackers  brought down Prudentials \u2018Assurance\u2019 Medicare system forever.\n  ESET hackers only allowing \u2018bad traffic\u2019 .",
          "modified": "2025-12-30T19:04:40.430000",
          "created": "2025-11-30T21:27:56.239000",
          "tags": [
            "enter",
            "extract",
            "enter source",
            "urls",
            "address",
            "remote connect",
            "private ip",
            "sql",
            "inject",
            "montserrat",
            "script urls",
            "germany unknown",
            "xml title",
            "wiesinger",
            "style",
            "ip address",
            "script domains",
            "body doctype",
            "encrypt",
            "botnet",
            "dropper",
            "unix",
            "resolverror",
            "et exploit",
            "outbound",
            "mirai variant",
            "useragent",
            "inbound",
            "et trojan",
            "et webserver",
            "scan mirai",
            "hello",
            "execution",
            "mirai",
            "malware",
            "shell",
            "nids",
            "ids detections",
            "wget command",
            "http headers",
            "dlink devices",
            "home network",
            "mvpower dvr",
            "shell uce",
            "mirai elf",
            "linux malware",
            "is__elf",
            "cnc",
            "meta http",
            "content",
            "gmt server",
            "files",
            "reverse dns",
            "germany",
            "ismaning",
            "germany asn",
            "as5539 spacenet",
            "germany https",
            "auto generated security (?)",
            "redacted for",
            "name servers",
            "aaaa",
            "search",
            "for privacy",
            "title",
            "intel",
            "ms windows",
            "pe32",
            "process32nextw",
            "write c",
            "mssql port",
            "hash",
            "beapy",
            "bit32bit",
            "agent",
            "write",
            "hacktool",
            "win32",
            "next",
            "suspicious user",
            "pybeapy cnc",
            "checkin",
            "w32beapy cnc",
            "beacon",
            "module load",
            "external ip",
            "lookup",
            "home assistant",
            "intptr",
            "uint32",
            "type",
            "parameter",
            "oldprotectflag",
            "mandatory",
            "throw",
            "position",
            "lkshkdandl",
            "success",
            "info",
            "powershell",
            "null",
            "error",
            "date hash",
            "next yara",
            "detections name",
            "medium",
            "graph tree",
            "sample",
            "sample hash",
            "exec bypass",
            "c ipconfig",
            "world",
            "jaws webserver",
            "chmod usage",
            "strings",
            "extraction",
            "data upload",
            "extre",
            "include data",
            "hos hos",
            "y se",
            "sugges",
            "find s",
            "typ hos",
            "hos data",
            "hos hostname",
            "hos host",
            "extr data",
            "tethering",
            "tulach",
            "114.114.114.114",
            "passive dns",
            "pulse pulses",
            "http",
            "related nids",
            "files location",
            "united",
            "flag united",
            "files domain",
            "next associated",
            "ipv4 add",
            "delphi",
            "read c",
            "packing t1045",
            "t1045",
            "worm",
            "code",
            "june",
            "irc nick command",
            "irc",
            "meta",
            "status",
            "record value",
            "unknown aaaa",
            "expiration",
            "url http",
            "indicator role",
            "pulses url",
            "no expiration",
            "url https",
            "url url",
            "o url",
            "request review",
            "hosting",
            "unknown",
            "medium security",
            "extra data",
            "failed",
            "linkedin",
            "url add",
            "ireland flag",
            "ireland",
            "dublin",
            "ireland asn",
            "as16509",
            "spyware",
            "nso",
            "nso group",
            "pegasus related",
            "nso related",
            "framing",
            "porn",
            "python",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "apple",
            "192.168.1.1",
            "law",
            "attorney"
          ],
          "references": [
            "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
            "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
            "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
            "Mirai Botnet - *Inbound & Outbound connection",
            "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
            "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
            "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
            "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)",
            "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
            "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
            "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
            "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
            "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
            "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
            "https://frostty12ice.info/ \u2022 https://lawhubh.info",
            "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Botnet-6566040-0",
              "display_name": "Unix.Dropper.Botnet-6566040-0",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Montserrat",
              "display_name": "Montserrat",
              "target": null
            },
            {
              "id": "Beapy",
              "display_name": "Beapy",
              "target": null
            },
            {
              "id": "HackTool:Win32/PowerSploit!rfn",
              "display_name": "HackTool:Win32/PowerSploit!rfn",
              "target": "/malware/HackTool:Win32/PowerSploit!rfn"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom.PB!MTB",
              "display_name": "Worm:Win32/Mydoom.PB!MTB",
              "target": "/malware/Worm:Win32/Mydoom.PB!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "TA0036",
              "name": "Exfiltration",
              "display_name": "TA0036 - Exfiltration"
            },
            {
              "id": "TA0039",
              "name": "Remote Service Effects",
              "display_name": "TA0039 - Remote Service Effects"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1019",
              "name": "System Firmware",
              "display_name": "T1019 - System Firmware"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553.001",
              "name": "Gatekeeper Bypass",
              "display_name": "T1553.001 - Gatekeeper Bypass"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1609",
              "name": "Container Administration Command",
              "display_name": "T1609 - Container Administration Command"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            }
          ],
          "industries": [
            "Government",
            "Legal",
            "Healthcare",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4147,
            "domain": 871,
            "hostname": 2194,
            "FileHash-MD5": 279,
            "FileHash-SHA1": 257,
            "FileHash-SHA256": 2183,
            "CVE": 6,
            "email": 3,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 9941,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "111 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6769c9335e6691b76d03c761",
          "name": "waketagat",
          "description": "",
          "modified": "2024-12-23T20:33:55.121000",
          "created": "2024-12-23T20:33:55.121000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1470,
            "domain": 31,
            "hostname": 472,
            "FileHash-SHA256": 63
          },
          "indicator_count": 2036,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 177,
          "modified_text": "482 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66ce3eb4b4f1fc9eafb4b572",
          "name": "DDoS:Linux/Lightaidra | Mirai Botnet on US a State Computer",
          "description": "*Mirai Botnet on Colorado State computer. Im starting to wonder if potential problem cases are diverted to a botnet.\n1. Overlaps with a Colorado victim. Similar issues. I Recently became a senior in expensive Colorado, never compensated for workers compensation injury exacerbated when suddenly tossed a 60 lb weighted ball under care. Denied diagnoses of severe injury after toss. Complained, case closed, lawyers denied case after accepting case. Referred to JeffCo seeking assisted living resources. Was sent various packets with a variety of phone numbers, email addresses, etc. She keeps speaking to same man no matter what option chosen. Denied workforce training due to severity of injuries, No SSI or SSDI until years later. \n2. I can't pulse half of what I've researched without using multiple resources. No more 'contacted' made when new serious issues found. Pulses being modified. I rarely modify any pulse.",
          "modified": "2024-09-26T20:01:27.723000",
          "created": "2024-08-27T21:01:40.251000",
          "tags": [
            "memcommit",
            "read c",
            "nospltezraxuf",
            "writeconsolea",
            "write",
            "CVE-2023-22518",
            "tesla",
            "ye ye",
            "incapril",
            "yed ye",
            "yet ye",
            "yexe ye",
            "security",
            "search",
            "function read",
            "dll read",
            "installer",
            "april",
            "copy",
            "win32",
            "template",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "name servers",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "date",
            "windows",
            "medium",
            "shellexecuteexw",
            "hash",
            "show",
            "writeconsolew",
            "entries",
            "displayname",
            "sddl",
            "service",
            "august",
            "malware",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "domain",
            "status",
            "nxdomain",
            "whitelisted",
            "certificate",
            "backdoor",
            "record value",
            "body",
            "as15133 verizon",
            "united",
            "unknown",
            "mtb aug",
            "gmt server",
            "ecacc sed5906",
            "ransom",
            "trojan",
            "high",
            "cname",
            "as8075",
            "ipv4",
            "files",
            "asn as55720",
            "date hash",
            "default",
            "delete",
            "yara detections",
            "msvisualcpp60",
            "related pulses",
            "rootkit",
            "as16276",
            "canada unknown",
            "pulses",
            "expiration date",
            "exploit",
            "showing",
            "aaaa",
            "france unknown",
            "mtb sep",
            "worm",
            "msil",
            "mirai",
            "as36081 state",
            "reverse dns",
            "port",
            "destination",
            "south korea",
            "taiwan as3462",
            "as4766 korea",
            "asnone",
            "japan as17676",
            "china as4134",
            "china as4837",
            "file samples",
            "files matching",
            "next",
            "copyright",
            "levelblue",
            "as20940",
            "as15169 google",
            "ave suite",
            "purpose p5",
            "country united",
            "code us",
            "as41231",
            "united kingdom",
            "ddos",
            "sha256",
            "filehash",
            "av detections",
            "location london",
            "great britain",
            "gnulinux apt",
            "yara rule",
            "ids detections",
            "top source",
            "address",
            "as23969",
            "thailand"
          ],
          "references": [
            "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
            "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
            "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo",
            "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
            "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
            "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
            "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
            "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
            "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Overlaps: 4 others mailed information email address.",
            "Ransom:Win32/WannaCrypt.H",
            "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
            "AS36081 State of Colorado General Government Computer",
            "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
            "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Detections Executable and linking format (ELF) file download Over HTTP |",
            "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
            "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
            "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
            "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
            "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
            "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
            "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
            "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
            "redirect.wuxs.icu",
            "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
            "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:MSIL/AgentTesla.KM",
              "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Malware.Dxqo-6984072-0",
              "display_name": "Win.Malware.Dxqo-6984072-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt",
              "display_name": "Ransom:Win32/WannaCrypt",
              "target": "/malware/Ransom:Win32/WannaCrypt"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski",
              "display_name": "Backdoor:Win32/Fynloski",
              "target": "/malware/Backdoor:Win32/Fynloski"
            },
            {
              "id": "Worm:Win32/Mofksys",
              "display_name": "Worm:Win32/Mofksys",
              "target": "/malware/Worm:Win32/Mofksys"
            },
            {
              "id": "TELPER:DDoS:Linux/Lightaidra",
              "display_name": "TELPER:DDoS:Linux/Lightaidra",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1009",
              "name": "Binary Padding",
              "display_name": "T1009 - Binary Padding"
            },
            {
              "id": "T1499",
              "name": "Endpoint Denial of Service",
              "display_name": "T1499 - Endpoint Denial of Service"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            }
          ],
          "industries": [
            "Telecom"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 675,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3327,
            "URL": 2448,
            "domain": 656,
            "hostname": 1281,
            "email": 11
          },
          "indicator_count": 9064,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "570 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
        "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
        "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il",
        "Overlaps: 4 others mailed information email address.",
        "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
        "Detections Executable and linking format (ELF) file download Over HTTP |",
        "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
        "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
        "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
        "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library",
        "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo",
        "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
        "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
        "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
        "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
        "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
        "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
        "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
        "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
        "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
        "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
        "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
        "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
        "helloprismatic.com",
        "Amnesty.org | remote.amnesty.org",
        "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
        "https://frostty12ice.info/ \u2022 https://lawhubh.info",
        "Ransom:Win32/WannaCrypt.H",
        "redirect.wuxs.icu",
        "AS36081 State of Colorado General Government Computer",
        "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
        "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
        "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
        "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
        "Mirai Botnet - *Inbound & Outbound connection",
        "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
        "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
        "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
        "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
        "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
        "ipv4bot.whatismyipaddress.com",
        "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
        "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
        "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
        "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "Brian Sabey",
        "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
        "Delphi This program must be run under Win32 Compilers",
        "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
        "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
        "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
        "tulach.cc",
        "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
        "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Nids",
            "Unix.dropper.botnet-6566040-0",
            "Win.trojan.cobaltstrike-9044898-1",
            "Worm:win32/mofksys",
            "Hacktool:win32/powersploit!rfn",
            "Backdoor:win32/fynloski",
            "Montserrat",
            "Worm:win32/mydoom.pb!mtb",
            "Ransom:win32/gandcrab",
            "Beapy",
            "Ransom:win32/wannacrypt",
            "Tulach",
            "Win.malware.dxqo-6984072-0",
            "Cve-2023-2868",
            "Mirai",
            "Alf:trojan:msil/agenttesla.km",
            "Telper:ddos:linux/lightaidra",
            "Exploit:win32/cve-2017-0147",
            "Worm:win32/benjamin"
          ],
          "industries": [
            "Insurance",
            "Telecom",
            "Civil society",
            "Government",
            "Legal",
            "Healthcare"
          ],
          "unique_indicators": 35449
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/yixun.com",
    "whois": "http://whois.domaintools.com/yixun.com",
    "domain": "yixun.com",
    "hostname": "ssl.xui.ptlogin2.yixun.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "6944ce38344ccded23df66f5",
      "name": "Ransom - Amnesty.org - a single link in a Pegasus attack against a civilian.",
      "description": "I don\u2019t have the right words to put this together because it involves so much coercion, fraud, betrayal, manipulation , hacking, multiple business fronts, loud mouth mafia plants, working with someone under false pretenses, redhat security teams in Denver , Colorado, false implications of cyber attacks coming from foreign entities. \n\nTips come from a highly reliable sources. One link in a Pegasus attack .",
      "modified": "2026-01-18T03:05:59.836000",
      "created": "2025-12-19T04:02:00.973000",
      "tags": [
        "intel",
        "ms windows",
        "write c",
        "pe32",
        "pe32 executable",
        "copy c",
        "free",
        "benjamin",
        "write",
        "worm",
        "win32",
        "code",
        "june",
        "delphi",
        "malware",
        "benjamin",
        "tulach",
        "state of colorado",
        "christopher p. \u2018buzz\u2019 ahmann",
        "danica implants",
        "nids_malware_alert",
        "bonu$",
        "network_icmp",
        "network_irc",
        "persistence_autorun",
        "network_http",
        "nids_alert",
        "allocates_rwx",
        "hackers",
        "creates_exe",
        "brian sabey",
        "sour del",
        "packer_entropy",
        "antivm_memory_available",
        "pe_features",
        "get key",
        "crime",
        "organized crime",
        "federal crime",
        "cyber crime",
        "piracy",
        "status",
        "china unknown",
        "name servers",
        "div div",
        "ip address",
        "domain",
        "creation date",
        "record value",
        "meta",
        "title",
        "hong kong",
        "passive dns",
        "gmt content",
        "type",
        "content length",
        "ipv4 add",
        "urls",
        "files",
        "location hong",
        "twitter",
        "youtube",
        "side 3 studios",
        "denver music",
        "infiltration",
        "whistleblower",
        "getkey",
        "cyber warfare",
        "fraud",
        "financial crimes",
        "pegasus",
        "music front",
        "france unknown",
        "present feb",
        "iran unknown",
        "present nov",
        "present jun",
        "present jan",
        "hidden",
        "present jul",
        "date",
        "united",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "llc name",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "pattern match",
        "mitre att",
        "show technique",
        "ck matrix",
        "ascii text",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "memory dumping",
        "entries",
        "icmp delphi",
        "showing",
        "delete",
        "yara detections",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "dns query",
        "packing t1045",
        "ransom",
        "cve",
        "palantir",
        "remote",
        "graham"
      ],
      "references": [
        "Amnesty.org | remote.amnesty.org",
        "tulach.cc",
        "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
        "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
        "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
        "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
        "Delphi This program must be run under Win32 Compilers",
        "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
        "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
        "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
        "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
        "ipv4bot.whatismyipaddress.com",
        "helloprismatic.com",
        "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
        "Brian Sabey",
        "Christopher P. \u2018Buzz\u2019 Ahmann"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "Ransom:Win32/GandCrab",
          "display_name": "Ransom:Win32/GandCrab",
          "target": "/malware/Ransom:Win32/GandCrab"
        },
        {
          "id": "CVE-2023-2868",
          "display_name": "CVE-2023-2868",
          "target": null
        },
        {
          "id": "Exploit:Win32/CVE-2017-0147",
          "display_name": "Exploit:Win32/CVE-2017-0147",
          "target": "/malware/Exploit:Win32/CVE-2017-0147"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 429,
        "FileHash-SHA1": 341,
        "FileHash-SHA256": 2766,
        "URL": 6976,
        "domain": 1151,
        "CVE": 2,
        "email": 3,
        "hostname": 2913,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 14585,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "92 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692cb6dc24da17618e3d9da6",
      "name": "Mirai Botnet | HackTool Powershell targets LinkedIn User | 192.168.1.1 \u2022  Remote Inbound Outbound Connection",
      "description": "Linux Malware - LinkedIn- True  Mirai Botnet  (192.168.1.1) (Never Connect) Incredibly powerful attack targeting LinkedIn users. In this instance the target is an ex husband of a target. |\nNDO Group relationships seen. This is a Botnet. \n\nMay be \u2018framing\u2019 attack that was launched in 2014. Attackers sent a clear message to target that she + husband would be arrested and charged with possession of 1000\u2019s of \u2018child pornography\u2019  pictures. \n\nAttack 10/10 malicious. Worked from separate system in separate location. Hackers unlocked a device,  zero clicks, removed PSW. Tulach malware seen a profile \u2018Michael Robert\u2019s of Rexxfield\u2019 may be  entity (NSA) with a face like Tulach. Uses the most WILD compromises. Government contractors? \n\nSame attackers  brought down Prudentials \u2018Assurance\u2019 Medicare system forever.\n  ESET hackers only allowing \u2018bad traffic\u2019 .",
      "modified": "2025-12-30T19:04:40.430000",
      "created": "2025-11-30T21:27:56.239000",
      "tags": [
        "enter",
        "extract",
        "enter source",
        "urls",
        "address",
        "remote connect",
        "private ip",
        "sql",
        "inject",
        "montserrat",
        "script urls",
        "germany unknown",
        "xml title",
        "wiesinger",
        "style",
        "ip address",
        "script domains",
        "body doctype",
        "encrypt",
        "botnet",
        "dropper",
        "unix",
        "resolverror",
        "et exploit",
        "outbound",
        "mirai variant",
        "useragent",
        "inbound",
        "et trojan",
        "et webserver",
        "scan mirai",
        "hello",
        "execution",
        "mirai",
        "malware",
        "shell",
        "nids",
        "ids detections",
        "wget command",
        "http headers",
        "dlink devices",
        "home network",
        "mvpower dvr",
        "shell uce",
        "mirai elf",
        "linux malware",
        "is__elf",
        "cnc",
        "meta http",
        "content",
        "gmt server",
        "files",
        "reverse dns",
        "germany",
        "ismaning",
        "germany asn",
        "as5539 spacenet",
        "germany https",
        "auto generated security (?)",
        "redacted for",
        "name servers",
        "aaaa",
        "search",
        "for privacy",
        "title",
        "intel",
        "ms windows",
        "pe32",
        "process32nextw",
        "write c",
        "mssql port",
        "hash",
        "beapy",
        "bit32bit",
        "agent",
        "write",
        "hacktool",
        "win32",
        "next",
        "suspicious user",
        "pybeapy cnc",
        "checkin",
        "w32beapy cnc",
        "beacon",
        "module load",
        "external ip",
        "lookup",
        "home assistant",
        "intptr",
        "uint32",
        "type",
        "parameter",
        "oldprotectflag",
        "mandatory",
        "throw",
        "position",
        "lkshkdandl",
        "success",
        "info",
        "powershell",
        "null",
        "error",
        "date hash",
        "next yara",
        "detections name",
        "medium",
        "graph tree",
        "sample",
        "sample hash",
        "exec bypass",
        "c ipconfig",
        "world",
        "jaws webserver",
        "chmod usage",
        "strings",
        "extraction",
        "data upload",
        "extre",
        "include data",
        "hos hos",
        "y se",
        "sugges",
        "find s",
        "typ hos",
        "hos data",
        "hos hostname",
        "hos host",
        "extr data",
        "tethering",
        "tulach",
        "114.114.114.114",
        "passive dns",
        "pulse pulses",
        "http",
        "related nids",
        "files location",
        "united",
        "flag united",
        "files domain",
        "next associated",
        "ipv4 add",
        "delphi",
        "read c",
        "packing t1045",
        "t1045",
        "worm",
        "code",
        "june",
        "irc nick command",
        "irc",
        "meta",
        "status",
        "record value",
        "unknown aaaa",
        "expiration",
        "url http",
        "indicator role",
        "pulses url",
        "no expiration",
        "url https",
        "url url",
        "o url",
        "request review",
        "hosting",
        "unknown",
        "medium security",
        "extra data",
        "failed",
        "linkedin",
        "url add",
        "ireland flag",
        "ireland",
        "dublin",
        "ireland asn",
        "as16509",
        "spyware",
        "nso",
        "nso group",
        "pegasus related",
        "nso related",
        "framing",
        "porn",
        "python",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "apple",
        "192.168.1.1",
        "law",
        "attorney"
      ],
      "references": [
        "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
        "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
        "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
        "Mirai Botnet - *Inbound & Outbound connection",
        "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
        "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
        "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
        "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)",
        "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
        "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
        "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
        "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
        "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
        "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
        "https://frostty12ice.info/ \u2022 https://lawhubh.info",
        "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Unix.Dropper.Botnet-6566040-0",
          "display_name": "Unix.Dropper.Botnet-6566040-0",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Montserrat",
          "display_name": "Montserrat",
          "target": null
        },
        {
          "id": "Beapy",
          "display_name": "Beapy",
          "target": null
        },
        {
          "id": "HackTool:Win32/PowerSploit!rfn",
          "display_name": "HackTool:Win32/PowerSploit!rfn",
          "target": "/malware/HackTool:Win32/PowerSploit!rfn"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom.PB!MTB",
          "display_name": "Worm:Win32/Mydoom.PB!MTB",
          "target": "/malware/Worm:Win32/Mydoom.PB!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "TA0036",
          "name": "Exfiltration",
          "display_name": "TA0036 - Exfiltration"
        },
        {
          "id": "TA0039",
          "name": "Remote Service Effects",
          "display_name": "TA0039 - Remote Service Effects"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1019",
          "name": "System Firmware",
          "display_name": "T1019 - System Firmware"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553.001",
          "name": "Gatekeeper Bypass",
          "display_name": "T1553.001 - Gatekeeper Bypass"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1609",
          "name": "Container Administration Command",
          "display_name": "T1609 - Container Administration Command"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        }
      ],
      "industries": [
        "Government",
        "Legal",
        "Healthcare",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4147,
        "domain": 871,
        "hostname": 2194,
        "FileHash-MD5": 279,
        "FileHash-SHA1": 257,
        "FileHash-SHA256": 2183,
        "CVE": 6,
        "email": 3,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 9941,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "111 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6769c9335e6691b76d03c761",
      "name": "waketagat",
      "description": "",
      "modified": "2024-12-23T20:33:55.121000",
      "created": "2024-12-23T20:33:55.121000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1470,
        "domain": 31,
        "hostname": 472,
        "FileHash-SHA256": 63
      },
      "indicator_count": 2036,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 177,
      "modified_text": "482 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66ce3eb4b4f1fc9eafb4b572",
      "name": "DDoS:Linux/Lightaidra | Mirai Botnet on US a State Computer",
      "description": "*Mirai Botnet on Colorado State computer. Im starting to wonder if potential problem cases are diverted to a botnet.\n1. Overlaps with a Colorado victim. Similar issues. I Recently became a senior in expensive Colorado, never compensated for workers compensation injury exacerbated when suddenly tossed a 60 lb weighted ball under care. Denied diagnoses of severe injury after toss. Complained, case closed, lawyers denied case after accepting case. Referred to JeffCo seeking assisted living resources. Was sent various packets with a variety of phone numbers, email addresses, etc. She keeps speaking to same man no matter what option chosen. Denied workforce training due to severity of injuries, No SSI or SSDI until years later. \n2. I can't pulse half of what I've researched without using multiple resources. No more 'contacted' made when new serious issues found. Pulses being modified. I rarely modify any pulse.",
      "modified": "2024-09-26T20:01:27.723000",
      "created": "2024-08-27T21:01:40.251000",
      "tags": [
        "memcommit",
        "read c",
        "nospltezraxuf",
        "writeconsolea",
        "write",
        "CVE-2023-22518",
        "tesla",
        "ye ye",
        "incapril",
        "yed ye",
        "yet ye",
        "yexe ye",
        "security",
        "search",
        "function read",
        "dll read",
        "installer",
        "april",
        "copy",
        "win32",
        "template",
        "creation date",
        "servers",
        "passive dns",
        "urls",
        "name servers",
        "scan endpoints",
        "all scoreblue",
        "hostname",
        "pulse pulses",
        "date",
        "windows",
        "medium",
        "shellexecuteexw",
        "hash",
        "show",
        "writeconsolew",
        "entries",
        "displayname",
        "sddl",
        "service",
        "august",
        "malware",
        "url http",
        "http",
        "ip address",
        "related nids",
        "files location",
        "domain",
        "status",
        "nxdomain",
        "whitelisted",
        "certificate",
        "backdoor",
        "record value",
        "body",
        "as15133 verizon",
        "united",
        "unknown",
        "mtb aug",
        "gmt server",
        "ecacc sed5906",
        "ransom",
        "trojan",
        "high",
        "cname",
        "as8075",
        "ipv4",
        "files",
        "asn as55720",
        "date hash",
        "default",
        "delete",
        "yara detections",
        "msvisualcpp60",
        "related pulses",
        "rootkit",
        "as16276",
        "canada unknown",
        "pulses",
        "expiration date",
        "exploit",
        "showing",
        "aaaa",
        "france unknown",
        "mtb sep",
        "worm",
        "msil",
        "mirai",
        "as36081 state",
        "reverse dns",
        "port",
        "destination",
        "south korea",
        "taiwan as3462",
        "as4766 korea",
        "asnone",
        "japan as17676",
        "china as4134",
        "china as4837",
        "file samples",
        "files matching",
        "next",
        "copyright",
        "levelblue",
        "as20940",
        "as15169 google",
        "ave suite",
        "purpose p5",
        "country united",
        "code us",
        "as41231",
        "united kingdom",
        "ddos",
        "sha256",
        "filehash",
        "av detections",
        "location london",
        "great britain",
        "gnulinux apt",
        "yara rule",
        "ids detections",
        "top source",
        "address",
        "as23969",
        "thailand"
      ],
      "references": [
        "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
        "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
        "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo",
        "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
        "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
        "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
        "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
        "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
        "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Overlaps: 4 others mailed information email address.",
        "Ransom:Win32/WannaCrypt.H",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
        "AS36081 State of Colorado General Government Computer",
        "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
        "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Detections Executable and linking format (ELF) file download Over HTTP |",
        "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
        "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
        "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
        "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
        "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
        "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
        "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
        "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
        "redirect.wuxs.icu",
        "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
        "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:MSIL/AgentTesla.KM",
          "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Malware.Dxqo-6984072-0",
          "display_name": "Win.Malware.Dxqo-6984072-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt",
          "display_name": "Ransom:Win32/WannaCrypt",
          "target": "/malware/Ransom:Win32/WannaCrypt"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski",
          "display_name": "Backdoor:Win32/Fynloski",
          "target": "/malware/Backdoor:Win32/Fynloski"
        },
        {
          "id": "Worm:Win32/Mofksys",
          "display_name": "Worm:Win32/Mofksys",
          "target": "/malware/Worm:Win32/Mofksys"
        },
        {
          "id": "TELPER:DDoS:Linux/Lightaidra",
          "display_name": "TELPER:DDoS:Linux/Lightaidra",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1009",
          "name": "Binary Padding",
          "display_name": "T1009 - Binary Padding"
        },
        {
          "id": "T1499",
          "name": "Endpoint Denial of Service",
          "display_name": "T1499 - Endpoint Denial of Service"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        }
      ],
      "industries": [
        "Telecom"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "FileHash-MD5": 675,
        "FileHash-SHA1": 664,
        "FileHash-SHA256": 3327,
        "URL": 2448,
        "domain": 656,
        "hostname": 1281,
        "email": 11
      },
      "indicator_count": 9064,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "570 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ssl.xui.ptlogin2.yixun.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ssl.xui.ptlogin2.yixun.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776712931.1092017
}