{
  "type": "URL",
  "indicator": "https://staging.emmasedit.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://staging.emmasedit.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4110162639,
      "indicator": "https://staging.emmasedit.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 20,
      "pulses": [
        {
          "id": "69dc04c12782d2d76c111a93",
          "name": "VirusTotal \u2022 PsBanker \u2022 Attacked / Blocked",
          "description": "",
          "modified": "2026-04-12T20:46:57.338000",
          "created": "2026-04-12T20:46:57.338000",
          "tags": [
            "indicator role",
            "active related",
            "ck ids",
            "files",
            "information",
            "discovery",
            "mitre att",
            "pattern match",
            "ck id",
            "ck matrix",
            "ascii text",
            "united",
            "binary file",
            "april",
            "hybrid",
            "apikey",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "protocol",
            "learn",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "execution att",
            "related pulses",
            "dll read",
            "function read",
            "icmp traffic",
            "machineguid",
            "systembiosdate",
            "total",
            "read",
            "write",
            "network_icmp",
            "js_eval",
            "recon_fingerprint",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "tls handshake",
            "execution",
            "dock",
            "persistence",
            "malware",
            "unknown",
            "neue",
            "certificate",
            "error",
            "scans show",
            "record value",
            "title site",
            "servers",
            "emails",
            "all hostname",
            "dnsadmin",
            "data upload",
            "extraction",
            "failed",
            "include review",
            "exclude sugges",
            "find s",
            "typ no",
            "active",
            "urls",
            "ip address",
            "asn as54113",
            "registrar",
            "wscript",
            "united states",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "ogoogle trust",
            "cngts ca",
            "whitelisted",
            "as15169",
            "hostile",
            "crash",
            "contacted",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "detections alf",
            "hostile yara",
            "detections none",
            "less ip",
            "domains",
            "ms windows",
            "intel",
            "pe32",
            "regsetvalueexa",
            "langturkish",
            "sublangdefault",
            "port",
            "destination",
            "entries",
            "worm",
            "delphi",
            "win32",
            "body",
            "explorer",
            "defender",
            "regdword",
            "false",
            "true",
            "end sub",
            "object",
            "createobject",
            "sheetschanged",
            "private sub",
            "string",
            "boolean",
            "cancel",
            "trojan",
            "copy",
            "query",
            "dns update",
            "useragent",
            "myapp",
            "delphi alerts",
            "alerts deadhost",
            "women who code",
            "tulach",
            "114.114.114.114",
            "samuel",
            "brian sabey"
          ],
          "references": [
            "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
            "this.target",
            "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
            "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
            "authrootstl.cab common file extension",
            "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
            "https://securityaffairs.com/144927/cyber-crime~#",
            "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
            "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
            "https://clockoutbox.es/password",
            "http://cr-malware.testpanw.com/url",
            "IDS Detections: Query to a *.pw domain - Likely Hostile",
            "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
            "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
            "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
            "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
            "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
            "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
            "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
            "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
            "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
            "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
            "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
            "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
            "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
            "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
            "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
            "114.114.114.114 = Tulach"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ALF:Trojan:Win64/PsBanker",
              "display_name": "ALF:Trojan:Win64/PsBanker",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Trojan:O97M/Madeba.A!det",
              "display_name": "Trojan:O97M/Madeba.A!det",
              "target": "/malware/Trojan:O97M/Madeba.A!det"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1114,
            "hostname": 594,
            "domain": 200,
            "FileHash-SHA256": 2379,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 259,
            "IPv4": 322,
            "SSLCertFingerprint": 24,
            "email": 2,
            "IPv6": 1
          },
          "indicator_count": 5321,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "7 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aa019f4509897e354fe029",
          "name": "credit Q Vashti Cloned Pulse ",
          "description": "",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-03-05T22:20:15.324000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69a2127d12dce12538b57d72",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5644,
            "domain": 701,
            "hostname": 1920,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9877,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a2127d12dce12538b57d72",
          "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
          "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-02-27T21:54:05.261000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5643,
            "domain": 700,
            "hostname": 1918,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9873,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac438a696c993b672106d",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:28.261000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "63 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac4327b5bc2e8be34f78a",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:22.323000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "63 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac416596cd89cf76bce55",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:04:53.997000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "63 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69612a0df518040b20932bef",
          "name": "Pahamify Pegasus | Palantir Malicious delivery via Bible app downloaded from iOS App Store",
          "description": "Pahamify Pegasus | Requires much further research.\nWorking backwards: Targeted device had a Bible Gateway app download by target from both iOS and Android devices. As per report each time app was accessed, iOS became glitched, passwords stolen, drive by compromise on lock screen prompted target to review app. She found the app login was changed to an unknown users name. I tested a (Bible Gateway) URI to see if her belief BG was a honey pot was true. \nThis may take 2-3 more rounds of research. \nIs Pegasus. Is Palantir. Is intrusive and malicious.\n\n[OTC auto generated Title: 2 Timothy 3 NIV - But mark this: There will be terrible - Bible Gateway]",
          "modified": "2026-02-08T15:00:50.749000",
          "created": "2026-01-09T16:17:17.632000",
          "tags": [
            "defense evasion",
            "cor ta0011",
            "techni process",
            "application l",
            "encrypted ch",
            "christ jesus",
            "just",
            "final charge",
            "timothy10",
            "antioch",
            "iconium",
            "lystra",
            "lord",
            "holy scriptures",
            "scripture",
            "bible gateway",
            "no expiration",
            "expiration",
            "a domains",
            "present sep",
            "united",
            "present jun",
            "meta",
            "present oct",
            "present aug",
            "servers",
            "title",
            "data upload",
            "extraction",
            "palantir foundry",
            "listeners",
            "dev",
            "redirects",
            "redirect health",
            "health data",
            "utc google",
            "utc na",
            "script",
            "utc amazon",
            "bible",
            "meta tags",
            "read",
            "bible reading",
            "trackers google",
            "anchor",
            "analyse headers",
            "contenttype",
            "transferenco",
            "connection",
            "date fri",
            "server",
            "read c",
            "as16509",
            "rgba",
            "unicode",
            "execution",
            "dock",
            "write",
            "persistence",
            "jsvendor",
            "jsapp",
            "script script",
            "cssapp",
            "jsfirebase",
            "moved",
            "urls",
            "pegasus",
            "encrypt",
            "script urls",
            "record value",
            "tls handshake",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "next",
            "capture",
            "malware",
            "unknown",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "access att",
            "t1189 driveby",
            "html",
            "mitre att",
            "ck matrix",
            "ascii text",
            "pattern match",
            "et info",
            "bad traffic",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "adversaries",
            "execution att",
            "t1204 user",
            "t1480 execution",
            "null",
            "refresh",
            "span",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "timothy",
            "search",
            "tag manager",
            "g8t6ln06z40",
            "code",
            "css",
            "js",
            "router",
            "cloudfront",
            "John 12:17",
            "port",
            "yara rule",
            "high",
            "tofsee",
            "rndhex",
            "rndchar",
            "destination",
            "loaderid",
            "lidfileupd",
            "stream"
          ],
          "references": [
            "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
            "https://pegasus.pahamify.com/",
            "aptia.palantirfoundry.com \u2022 palantirfoundry.com \u2022\u2019agent-infra-mojito.palantirfoundry.com",
            "equilibrium.palantirfoundry.com \u2022 kt-presales.palantirfoundry.com  \u2022 paloma.palantirfoundry.com",
            "usw-2-dev.palantirfoundry.com \u2022 lucyw.palantirfoundry.com \u2022 https://fegdip.palantirfoundry.com/",
            "http://dasima-containers.palantirfoundry.com/ \u2022 https://glare.palantirfoundry.com/",
            "https://inbound-message-listener-temporary-testing.palantirfoundry.com",
            "https://listeners.usw-16.palantirfoundry.com \u2022 https://pacificlife.palantirfoundry.com/",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.afa33b71-01ea-477c-bc01-f6a3ab623e9d/master",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
            "https://sfmg-testing.palantirfoundry.com\t\u2022 https://signup.palantirfoundry.com/",
            "https://uhsinc.palantirfoundry.com/  \u2022 https://velocityglobal.palantirfoundry.com",
            "https://wes.palantirfoundry.com/ \u2022 http://utilities-bootcamp.palantirfoundry.com/",
            "http://glare.palantirfoundry.com/ \u2022 https://woodward.palantirfoundry.com/",
            "https://sfmg-testing.palantirfoundry.com\t\u2022 https://signup.palantirfoundry.com/",
            "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd45176426a",
            "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd458176426a",
            "https://pegasus.pahamify.com/ \u2022 https://pegasus.pahamify.com/study-plan/ \u2022 pegasus.pahamify.com",
            "John 12:17"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Bible Gateway",
              "display_name": "Bible Gateway",
              "target": null
            },
            {
              "id": "Pahamify Pegasus",
              "display_name": "Pahamify Pegasus",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            },
            {
              "id": "T1608.005",
              "name": "Link Target",
              "display_name": "T1608.005 - Link Target"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1192",
              "name": "Spearphishing Link",
              "display_name": "T1192 - Spearphishing Link"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6527,
            "hostname": 2450,
            "FileHash-SHA256": 1716,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 134,
            "domain": 1101,
            "email": 3,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 12184,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "70 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693b7dc3cf1996347652ef92",
          "name": "Google Site Redirector - Tesla Hackers",
          "description": "Silencing. By Tesla hackers. Awful example of how any victim of a crime; can become a target of the government..\nThis is especially true when the actual perpetrators work for the government are government affiliated, very wealthy, a celebrity or someone who is deemed important. In this instance the Quasi government sought to keep target seeking and obtaining life saving medical treatment, financial settlement that she was entitled to from assault, injuries from assault, false imprisonment, punitive damgages, pain and suffering, humiliation, premise liability, permanent (whole body disability @MMI ), many other crimes. The victims suffered from a great sadness and betrayal. \n\nObviously racist Elon Musk and crew have access to all government tools. Musk, All things cyber are at his disposal as \ncontinues to abuse privilege.\n They keep  playing a God  they  don\u2019t believe in. God is the Ultimate Avenger.",
          "modified": "2026-01-11T00:03:08.581000",
          "created": "2025-12-12T02:28:19.107000",
          "tags": [
            "compromised_site_redirector_fromcharcode",
            "site_redirector",
            "string",
            "regexp",
            "error",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "retrieving",
            "notfound",
            "write",
            "form",
            "flash",
            "vd",
            "tesla hackers",
            "nxdomain",
            "passive dns",
            "ip address",
            "domain",
            "a nxdomain",
            "urls",
            "files",
            "ip related",
            "pulses otx",
            "google",
            "unknown",
            "oracle",
            "dynamicloader",
            "medium",
            "high",
            "windows",
            "rndhex",
            "write c",
            "rndchar",
            "displayname",
            "tofsee",
            "yara rule",
            "stream",
            "strings",
            "push",
            "lte all",
            "search otx",
            "ource url",
            "or text",
            "paste",
            "data upload",
            "extraction",
            "elon musk",
            "indicator role",
            "active related",
            "ipv4",
            "exploitsource",
            "url https",
            "url http",
            "desktopinternet",
            "title added",
            "pulses ipv4",
            "less see",
            "ids detections",
            "vuze bt",
            "udp connection",
            "contacted",
            "filehash",
            "av detections",
            "yara detections",
            "alerts",
            "0x8aa42",
            "0xe3107",
            "upnp",
            "http request",
            "bittorrent",
            "file",
            "module load",
            "t1129",
            "post http",
            "install",
            "execution",
            "malware",
            "hostile",
            "crawl",
            "windows nt",
            "wow64",
            "get zona",
            "get httpget",
            "hash",
            "entries",
            "read c",
            "suspicious",
            "next",
            "united"
          ],
          "references": [
            "Tesla Hackers  | https://www.teslarati.com/spacex",
            "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
            "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
            "IDS Detections Win32/ZonaInstaller Install Beacon",
            "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
            "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
            "https://www.google-analytics.com/debug/bootstrap?id=\\",
            "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
            "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
            "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
            "This is why our team tells a back story. It can and does happen to anyone.",
            "We apologize for so may typos and errors. We strive to do better at that."
          ],
          "public": 1,
          "adversary": "Tesla Hackers",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Trojan.12382640-1",
              "display_name": "Win.Trojan.12382640-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 65,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 2032,
            "URL": 4921,
            "domain": 567,
            "hostname": 1586,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 9209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "99 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6939d93da11a7d2bf7535ef1",
          "name": "Tesla Hackers Log In | Disqus",
          "description": "I\u2019m not for certain when blog \u2018https://pickyhot.disqus.com/tsara-brashears\u2019 first appeared online. It was present in 2016 -2021.  It was a porn spewing blog that obviously was full of tools. The lot pics debated targets race , beauty and other silly things. I don\u2019t know if target ever clicked on links. Tesla Hackers have played a major role in attacks against target. I haven\u2019t sifted through all malware yet. \n\n\n - Elon Musk - When Brashears suffered attempted hit on roadway she described suspect as an Elon Musk type, possible, offspring, or someone closely tied to him.",
          "modified": "2026-01-09T19:02:12.608000",
          "created": "2025-12-10T20:34:05.903000",
          "tags": [
            "disqus",
            "disqus.com",
            "comments",
            "blog",
            "blogs",
            "discussion",
            "google facebook",
            "twitter",
            "microsoft apple",
            "email",
            "forgot password",
            "login",
            "sign",
            "general full",
            "url https",
            "security tls",
            "united",
            "asn54113",
            "fastly",
            "reverse dns",
            "resource",
            "hash",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "network traffic",
            "t1057",
            "path",
            "learn",
            "command",
            "suspicious",
            "informative",
            "name tactics",
            "spawns",
            "t1480 execution",
            "signing defense",
            "file defense",
            "read c",
            "tlsv1",
            "search",
            "jfif",
            "ijg jpeg",
            "tls handshake",
            "failure",
            "show",
            "port",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "malware",
            "unknown",
            "waymo",
            "tesla",
            "musk",
            "austin",
            "bay area",
            "tesla ceo",
            "elon musk",
            "wednesday",
            "safety monitor",
            "synacktiv",
            "aaaa",
            "present jul",
            "status",
            "asnone country",
            "as13335",
            "present sep",
            "present apr",
            "present dec",
            "present jun",
            "lte all",
            "search otx",
            "additionally",
            "enter source",
            "url or",
            "data upload",
            "extraction",
            "entries",
            "present may",
            "dynamicloader",
            "as15169",
            "medium",
            "write c",
            "odigicert inc",
            "windows",
            "as54113",
            "worm",
            "copy",
            "explorer",
            "encrypt",
            "target tsraa brashears"
          ],
          "references": [
            "http://pickyhot.disqus.com/",
            "https://www.teslarati.com/tesla-hackers",
            "https://pickyhot.disqus.com/tsara-brashears",
            "All tags auto populated including\u2019 Elon Musk\u2019",
            "Running webserver Running WordPress Running Drupal",
            "bulletproof.palantirapollo.com \u2022 vpn-etuleusj2dpr.palantirclou",
            "https://publicsector.google/404-page-not-found/\t \u2022 www.founderstack.pro \u2022 oedfoundation.org",
            "https://www.founderstack.pro/feedhive \u2022 https://coinbase.getro.com/companies/astar-foundation \u2022 founders-vision.com",
            "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "www.endgame.com",
            "://blog.endgamesystems.com/ \u2022 http://httpswww.endgamesystems.com\t URL\thttp://wg41xm05b3.endgamesystems.com",
            "https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com\t\u2022 http://blog.endgamesystems.com",
            "https://httpswww.endgamesystems.com\t\u2022 https://wg41xm05b3.endgamesystems.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com",
            "https://blog.endgamesystems.com/\t\u2022 https://blog.endgamesystems.com",
            "http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/",
            "http://www.endgamesystems.com/",
            "Requires further research"
          ],
          "public": 1,
          "adversary": "Tesla Hackers",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Synacktiv",
              "display_name": "Synacktiv",
              "target": null
            },
            {
              "id": "Tesla Hackers",
              "display_name": "Tesla Hackers",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Mofksys",
              "display_name": "Mofksys",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2523,
            "URL": 6583,
            "FileHash-SHA256": 1132,
            "domain": 1483,
            "FileHash-SHA1": 43,
            "SSLCertFingerprint": 17,
            "FileHash-MD5": 109,
            "email": 2
          },
          "indicator_count": 11892,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "100 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693596f8cd50958de6e9415c",
          "name": "Eternal Blue Probe - YouTube - GSE",
          "description": "EternalBlue is an exploit that targets a critical vulnerability (CVE-2017-0144, part of the larger MS17-010 security bulletin) in Microsoft's implementation of the Server Message Block (SMB) version 1 (SMBv1) protocol, which is used for file and printer sharing on Windows networks. \nVulnerability: The flaw allows an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system by sending specially crafted packets to the SMBv1 server.\nOrigin: The exploit was developed by the NSA but was stolen and publicly leaked in April 2017 by a hacker group known as the Shadow Brokers.\nMajor Attacks: Shortly after its leak, EternalBlue was used in major, widespread cyberattacks, most notably the WannaCry and NotPetya ransomware outbreaks, which caused massive global disruption. The self-propagating \"wormable\" nature of the exploit allowed malware to spread rapidly across networks.",
          "modified": "2026-01-06T00:03:32.099000",
          "created": "2025-12-07T15:02:16.840000",
          "tags": [
            "asn as8068",
            "cloud provider",
            "reverse dns",
            "america flag",
            "united",
            "america asn",
            "as8068",
            "united states",
            "avast avg",
            "ids detections",
            "yara detections",
            "probe ms17010",
            "smbds ipc",
            "av detections",
            "alerts",
            "read c",
            "medium",
            "rgba",
            "unicode",
            "msf style",
            "dock",
            "write",
            "execution",
            "malware",
            "eternal blue",
            "check in",
            "file score",
            "medium risk",
            "generic flags",
            "ms17010",
            "none alerts",
            "less ip",
            "contacted",
            "matches",
            "mirroring",
            "chromeshorts",
            "gse",
            "google",
            "youtube",
            "dating apps",
            "suspicious apps",
            "search engine",
            "redirect",
            "eternalblue"
          ],
          "references": [
            "chromeshorts.com mirroring YouTube.com googlechinablog.com \u2022 www.google.com \u2022 108.177.121.105",
            "IDS Detections: ETERNALBLUE Probe Vulnerable System Response MS17-010",
            "IDS Detections : Possible ETERNALBLUE Probe MS17-010 (MSF style)",
            "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
            "IDS Detections: SMB-DS IPC$ unicode share access SMB-DS IPC$ share access",
            "Environment Awareness :  Able to access user sensitive domai",
            "Alerts :  suspicious_write_exe nids_exploit_alert process_martian injection_resumethread js_eval",
            "Alerts : network_http allocates_rwx suspicious_process stealth_window uses_windows_utilities",
            "Alerts : recono_fingerprint antivm_memory_available",
            "www.endgame.com",
            "admin-contact-api.uat2.white-label-dating.com \u2022 capi-sns.qa1.white-label-dating.com \u2022  http://payments.uat1.white-label-dating.com",
            "URL https://mailcatcher.qa2.white-label-dating.com",
            "Attackers : Christopher P. Ahmann , Hall Render , Brian Sabey & Co , Foundry , Tulach , Quasi government entities.",
            "Alt + Google \u2018branded\u2019 search engine (monitoring targets searches) YouTube mirroring.",
            "Suspicious apps"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 449,
            "FileHash-MD5": 26,
            "FileHash-SHA1": 6,
            "FileHash-SHA256": 169,
            "URL": 719,
            "domain": 86,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 1456,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "104 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6916dc43beba2f3839fd7c36",
          "name": "Ransomware | FIREEYE.COM redirects to www.TRELLIX.com",
          "description": "FireEye appears to have been a Cybersecurity  that now redirects to www.trellix.com. Seen before in a malicious MO.gov w/names of 2 \u2018alleged\u2019 female SA victims. I researched was without realizing it was a CySec.We have researched Trellix , found it to be malicious ;  reported false information / documentation. FEDNS1.FIREEYE.COM  URL is still found in several searches. So we researched it.\nRe: Safebae the other Mo. Gov SA URL found a\u2019. \u2018non profit\u2019 for Catherine \u2018Daisy\u2019 Coleman that isn\u2019t in any way related to her. It makes me believe it\u2019s could be related to Bae systems a collaboration with Peter Thiel's company Palantir, which provides data analytics software to governments and militaries. Significance: This partnership showcases the convergence of American tech innovation and traditional defense contracting, involving companies like Palantir and BAE Systems. \n\n#foundry #josht _ca #hostile #advesarial #contacted_hosts #safebae_or_bae_systems? #honeypotbot # fireeye #trellix",
          "modified": "2025-12-14T05:04:31.480000",
          "created": "2025-11-14T07:37:39.794000",
          "tags": [
            "gmt content",
            "related tags",
            "found title",
            "cache control",
            "x request",
            "runtime",
            "vary",
            "reverse dns",
            "ashburn",
            "resource",
            "verdict",
            "address",
            "read c",
            "unicode",
            "high",
            "memcommit",
            "delete",
            "dock",
            "write",
            "execution",
            "next associated",
            "server response",
            "port",
            "destination",
            "crlf line",
            "malware",
            "png image",
            "rgba",
            "united states",
            "medium",
            "encrypt",
            "america",
            "msie",
            "unknown",
            "present jan",
            "name servers",
            "present oct",
            "present may",
            "present mar",
            "present dec",
            "present nov",
            "united",
            "present apr",
            "present jun",
            "urls show",
            "url hostname",
            "ip address",
            "google safe",
            "results jun",
            "canada unknown",
            "passive dns",
            "canada",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "twitter",
            "chrome",
            "urls",
            "files",
            "asn as13335",
            "dns resolutions",
            "trojan",
            "trojanspy",
            "win32",
            "title",
            "servers",
            "unknown ns",
            "domain",
            "present aug",
            "present sep",
            "files domain",
            "files related",
            "none google",
            "safe browsing",
            "unknown aaaa",
            "moved",
            "cloudfront x",
            "meta",
            "ip whois",
            "registrar",
            "hostname",
            "files ip",
            "ipv4 add",
            "location united",
            "america flag",
            "america asn",
            "present jul",
            "virtool",
            "record value",
            "dnssec",
            "meta http",
            "content",
            "gmt server",
            "litespeed x",
            "present feb",
            "write c",
            "as62597 nsone",
            "as16509",
            "module load",
            "t1129",
            "service",
            "dynamicloader",
            "windows",
            "tofsee",
            "stream",
            "hostile",
            "win64",
            "delete c",
            "all ipv4",
            "url analysis",
            "status",
            "error",
            "aaaa",
            "ireland unknown",
            "asn as14618",
            "backdoor",
            "a domains",
            "russia",
            "mtb nov",
            "ransom",
            "displayname",
            "push",
            "yara rule",
            "loaderid",
            "lidfileupd",
            "localcfg",
            "rndhex",
            "rndchar",
            "checks",
            "checks system",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "learn",
            "command",
            "adversaries",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "found",
            "ssl certificate",
            "flag",
            "server",
            "cloudflare",
            "csc corporate",
            "domains",
            "fireeye",
            "contacted hosts",
            "mitre att",
            "pattern match",
            "ck matrix",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "foundry",
            "josht.ca",
            "paid parking",
            "parking crews"
          ],
          "references": [
            "Fireye - FEDNS1.FIREEYE.COM",
            "http://3marketeers.org/sstcp/ss_ct/ct/Foundry-US-Palo-Alto-Networks-Q423-The-Complete-Cloud-Security-LP.html?_v_c=MzI5MDQ0OQ==sosODczNzY1sosNTM1NTU5Mjc=&ide=YXZhLmNoYXdsYUBhbGdvc2VjLmNvbQ==&lbu=eQ==",
            "http://allitlive.com/sstcp/ss_ct/ct/Foundry-Q124-DE-eBook-The-data-store-for-AI-Landing-page.html?_v_c=MzM3OTU1OA==sosNjQ0MA==sosNjI5NDA4MDQ=&ide=cmFkb3NsYXcubWFqY3pha0BseW9uZGVsbGJhc2VsbC5jb20=&lbu=eQ==",
            "https://tecwebnow.com/sstcp/ss_ct/ct/Foundry-Q124-DE-eBook-The-data-store-for-AI-Landing-page.html?_v_c=MzM3OTU1Nw==sosNjQ0MA==sosNjI5NDA4MDQ=&ide=cmFkb3NsYXcubWFqY3pha0BseW9uZGVsbGJhc2VsbC5jb20=&lbu=eQ==",
            "https://visionayr-live.com/sstcp/ss_at/at/Foundry-Q423-The-Quantified-Benefits-of-Fortinet-Security-Operations-Solutions-lp.html?_v_c=MzE3MDM0Mg==sosMzczODcwsosNDkzNDA4ODI=&lb_email=carine.malessard@idorsia.com&campaign_id=254013&program_id=36356",
            "http://p2d.josht.ca/assets/content-delivery/depots/download",
            "test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 p2d.josht.ca pma.josht.ca  \u2022 sa.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
            "http://josht.ca/portfolio \u2022 http://josht.ca/portfolio/ \u2022 http://p2d.josht.ca/  \u2022 http://pma.josht.ca/  \u2022 http://sa.josht.ca",
            "http://p2d.josht.ca/assets/content-delivery/depots/download/ \u2022 http://staging.josht.\u2022 https://dev.josht.ca/",
            "https://p2d.josht.ca/assets/content-delivery/depots/download/ \u2022 https://test.josht.ca/ \u2022",
            "https://josht.ca/portfolio/style.css \u2022https://sa.josht.ca \u2022 https://staging.josht.ca/",
            "https://josht.ca/favicon.ico \u2022 https://josht.ca/portfolio/ \u2022 https://josht.ca/portfolio/background.jpg",
            "https://p2d.josht.ca/api/depots/info/?depot=",
            "https://p2d.josht.ca/assets/content \u2022 http://joshwilsonmusic.umg-wp.com/",
            "Audrie & Daisy documentary unknown to any Sexual Assault advocacies across USA. We really researched.",
            "According to newspaper accounts and  Daisy Coleman committed suicide in Lakewood , Co  in 2021",
            "Next her mom commits suicide, brother died in a one car accident, Fatver died in an accident. Entire family dead?",
            "Daisy was allegedly brutally assaulted by Matthew Barnett,",
            "Matthew grandfather , a powerful local politician & former republican Missouri state representative, Rex Barnett.",
            "Is that where they\u2019re getting these names? Rexxfield.com. SMH",
            "There is evidence that Miss Coleman lived and died in Colorado after reporting being stalked.",
            "According to accounts she was afraid for her life , found to be safe then took her own life?",
            "Typing a suicide note on social media is suspicious since it could come from your murderer.",
            "So both Tsara Brashears & Daisy Coleman have identical stories? No one would help her?",
            "Since I don\u2019t know Daisy and have zero records except from accounts by someone in a botnet\u2026.",
            "and our limited information, is Daisy a victim or a crisis actor?",
            "Dad drives off road. Daisy raped, bullied, brother driven off road if you ask me",
            "Daisy dies in the same night she doesn\u2019t want to, Mom decided to join her? No. Murder or HoneyPot tales.",
            "Mo.Gov associated https://otx.alienvault.com/pulse/6916d97edb28b2616ffac3ab (cloned from OctoSeek)",
            "Sometimes pulses are attacked by a delete service. Sometimes people asked to have IoC\u2019s removed.",
            "FireEye was there in 2 year old pulse now removed? I\u2019ll find it."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7617,
            "domain": 1127,
            "hostname": 3591,
            "email": 9,
            "FileHash-SHA256": 1160,
            "FileHash-MD5": 481,
            "FileHash-SHA1": 404,
            "SSLCertFingerprint": 13,
            "CVE": 1
          },
          "indicator_count": 14403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "126 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69069167e1e2a222bd7762f2",
          "name": "Palantir - Spyware",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-11-01T23:01:59.339000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "privacynotacrime",
            "id": "349346",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 57,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a6f4e35193c04401daaf",
          "name": "Emotet & VirTool Obsfuscator - Registrar abuse tracking civilians",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:54:28.671000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a1ef2dd26ec62a3c298c",
          "name": "Listeners - Malicious Over the top espionage | Cyber Warfare?",
          "description": "Cyber attacks on targeted devices stored safely, separately, don\u2019t communicate with one another. PalantirFoundry.com shares IP addresses with Fastly. South African IP\u2019s and DGA domains bounce from US Denver , Co based IP and Domain addresses. Registrar Abuse: HTTP/2 404 content type: text/html content length: 2263 date: Wed 22 Oct 2025 22:32:18 GMT server: Envoy\n443 Certificate Subject: US\n443 Certificate Subject: Colorado\n443 Certificate Subject: Denver\n443 Certificate Subject: Palantir Technologies Inc.\n443 Certificate Subject: listeners.usw-19.palantirfoundry.com",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:33:03.315000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 180,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68e32dd0c55bf224eb99dd58",
          "name": "Appspot.com - Google account fraud & infostealing",
          "description": "Fake Google email accounts. I\u2019ve reviewed a handful of targets with this issue. If starting with a new device, signed up for a new google account,\nthe users are automatically logged out, forced to sign in again, checked security features where you can see an unauthorized autonomous general\nphone, or iPhone or MacBook was also signed in in a different location. Even if you delete the device or email account, I\u2019ve seen the intruder handle CnC of all backups of photos and clouds. \n\n\n\n[OTX auto populated - The full list of domain names: APPSPot.COM.com, which was created on the same day as the Google search engine, has been published by the internet regulator, the IANA.]",
          "modified": "2025-11-05T01:01:26.928000",
          "created": "2025-10-06T02:47:44.098000",
          "tags": [
            "aaaa",
            "susp",
            "trojan",
            "google",
            "server",
            "domain status",
            "registrar abuse",
            "domain name",
            "us registrant",
            "email",
            "contact email",
            "rdap database",
            "google app",
            "google hosted",
            "please",
            "vulnerabilities",
            "join",
            "bring",
            "api explorer",
            "engine",
            "admin sdk",
            "info",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "ascii text",
            "united",
            "pattern match",
            "mitre att",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "porn",
            "phishing",
            "fraud",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "download",
            "apt",
            "ansi",
            "dumps",
            "file string",
            "seen",
            "disabled hash",
            "close",
            "hosts",
            "contact",
            "tellwise",
            "passive dns",
            "urls",
            "pulse pulses",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "asn as15169",
            "extraction",
            "data upload",
            "extra",
            "referen http",
            "changed data",
            "failed",
            "include review",
            "t07 exclude",
            "extri data",
            "changed",
            "exclude",
            "find s",
            "tvnes data",
            "status",
            "present nov",
            "name servers",
            "entries",
            "geoid no",
            "present dec",
            "date",
            "error",
            "title",
            "sugges",
            "typ no",
            "no entrieotound",
            "scam",
            "foundry",
            "sabey type",
            "denver",
            "quasi",
            "phoenix",
            "australia"
          ],
          "references": [
            "appspot.com  \u2022 hyper7install.appspot.com",
            "https://hybrid-analysis.com/sample/c61237fcb798f05e6af32a6aa13f8e795aac47559d601eb7f93ad65bcf58b418/68e30c476b91a8000b0dd786",
            "http://acounts.google.com/v/signin/identifier?continue=hts%253%252F2Fconsole.cloud.google.com2Fapengine&dsh=5-1106814258%2539876543210",
            "Changed last several digits of gmail account # In example",
            "http://console.cloud.google.com/appengine",
            "https://310940000.android.com.twitter.android.adsenseformobileapps.com/",
            "https://www.netify.ai/resources/domains \u2022 192-168-0-21.3pt3m9ng2hf.ddns.manage.alta.inc",
            "device-local-de06e551-6b23-4aa3-bb67-6972ae6d30b5.remotewd.com 192.168.0.21",
            "116e33e0-8832-11ec-aef5-99a1d044639a-local.solinkcloud.com",
            "jaycobundaberg.eclipseaurahub.com.au 192.168.0.21",
            "grafana.ledocloud.com\u2022 192.168.0.21",
            "192-168-0-21.siliconevalley1.direct.quickconnect.to"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32/Madang",
              "display_name": "Win32/Madang",
              "target": null
            },
            {
              "id": "Win.Downloader.Small-1966",
              "display_name": "Win.Downloader.Small-1966",
              "target": null
            },
            {
              "id": "Win32:SaliCode",
              "display_name": "Win32:SaliCode",
              "target": null
            },
            {
              "id": "Virtool:Win32/Vbinder.CO",
              "display_name": "Virtool:Win32/Vbinder.CO",
              "target": "/malware/Virtool:Win32/Vbinder.CO"
            },
            {
              "id": "!Themida",
              "display_name": "!Themida",
              "target": null
            },
            {
              "id": "Virus:Win32/Sality.AT",
              "display_name": "Virus:Win32/Sality.AT",
              "target": "/malware/Virus:Win32/Sality.AT"
            },
            {
              "id": "Win32/Scrarev.C",
              "display_name": "Win32/Scrarev.C",
              "target": null
            },
            {
              "id": "Trojan:MSIL/RapidStealer.A",
              "display_name": "Trojan:MSIL/RapidStealer.A",
              "target": "/malware/Trojan:MSIL/RapidStealer.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 222,
            "FileHash-MD5": 146,
            "FileHash-SHA1": 317,
            "FileHash-SHA256": 1120,
            "email": 3,
            "hostname": 881,
            "URL": 1338,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 4034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "166 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c54659742e10df0e2dd0ec",
          "name": "Archive.ph - Mirai",
          "description": "",
          "modified": "2025-10-03T00:01:12.616000",
          "created": "2025-09-13T10:24:25.814000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "javascript",
            "spawns",
            "united",
            "present aug",
            "div div",
            "meta",
            "fffae1",
            "xml title",
            "drag",
            "div form",
            "form div",
            "a li",
            "encrypt",
            "russia",
            "passive dns",
            "urls",
            "aaaa",
            "netherlands",
            "your ip",
            "panama",
            "russia unknown",
            "present mar",
            "present jun",
            "moved",
            "present jul",
            "present sep",
            "ip address",
            "present jan",
            "body",
            "title",
            "domain",
            "files",
            "content type",
            "body doctype",
            "as16509",
            "intel mac",
            "os x",
            "ipv4 add",
            "port",
            "destination",
            "read c",
            "medium",
            "entries",
            "et info",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "malware",
            "url analysis",
            "files ip",
            "name server",
            "domain address",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "us as15169",
            "us as396982",
            "mitre att",
            "pattern match",
            "form",
            "onload",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "verify",
            "asnone",
            "china as4134",
            "resolverror",
            "high",
            "dns query",
            "as7018 att",
            "japan as4713",
            "south korea",
            "little \u2018endian\u2019",
            "mirai",
            "dod",
            "endgame systems",
            "government overreach",
            "sabey type",
            "foundry type",
            "apple",
            "cve"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Mirai-7135858-0",
              "display_name": "Unix.Dropper.Mirai-7135858-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": "68b798c0a419c49eeb4e2a13",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "privacynotacrime",
            "id": "349346",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2069,
            "domain": 406,
            "FileHash-SHA256": 1498,
            "hostname": 811,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 138,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 5082,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 59,
          "modified_text": "199 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68b798c0a419c49eeb4e2a13",
          "name": "Archive.ph - Mirai",
          "description": "Outdated archiving domain of questionable origin     can expose or has exposed monitored target/s to\nUnix.Dropper.Mirai-7135858-0.\n\nThe domain seems to want to appear as if it originates from Russia. There is a DoD & Endgame systems relationship. Multiple archived pages have been injected and deleted.\n(Little Endian) is a name seen  often related to an innocent known to be targeted by a pro male entity who utilizes Pegasus, Palantir, Gotham, Foundry , Tulach, for silencing.\n#trulymissed #mirai #malicious",
          "modified": "2025-10-03T00:01:12.616000",
          "created": "2025-09-03T01:24:16.418000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "javascript",
            "spawns",
            "united",
            "present aug",
            "div div",
            "meta",
            "fffae1",
            "xml title",
            "drag",
            "div form",
            "form div",
            "a li",
            "encrypt",
            "russia",
            "passive dns",
            "urls",
            "aaaa",
            "netherlands",
            "your ip",
            "panama",
            "russia unknown",
            "present mar",
            "present jun",
            "moved",
            "present jul",
            "present sep",
            "ip address",
            "present jan",
            "body",
            "title",
            "domain",
            "files",
            "content type",
            "body doctype",
            "as16509",
            "intel mac",
            "os x",
            "ipv4 add",
            "port",
            "destination",
            "read c",
            "medium",
            "entries",
            "et info",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "malware",
            "url analysis",
            "files ip",
            "name server",
            "domain address",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "us as15169",
            "us as396982",
            "mitre att",
            "pattern match",
            "form",
            "onload",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "verify",
            "asnone",
            "china as4134",
            "resolverror",
            "high",
            "dns query",
            "as7018 att",
            "japan as4713",
            "south korea",
            "little \u2018endian\u2019",
            "mirai",
            "dod",
            "endgame systems",
            "government overreach",
            "sabey type",
            "foundry type",
            "apple",
            "cve"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Mirai-7135858-0",
              "display_name": "Unix.Dropper.Mirai-7135858-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2069,
            "domain": 406,
            "FileHash-SHA256": 1498,
            "hostname": 811,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 138,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 5082,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "199 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689b9b9fab42ca4f016a226f",
          "name": "Elastic's Al-driven Endpoint Security - Red Team Malicious (moved?)",
          "description": "Endgame - Unruy Activity -System infection | (Moved) Endpoint security (MOVED) from Elastic\nElastic's Al-driven security analytics empowers you with comprehensive endpoint protection. Detect, investigate, and respond to threats faster with a single agent and unified console. Gain actionable insights for a proactive defense posture. All built on the Search\nAl platform.\n| Used maliciously against monitored non-criminal targets. |\n{ virus - https://universitycenter.uccs.edu/}\n#unruy #activity #monitored_target #red_team_malicious #trojan #worm #moved\n#ai #adversarial #custom_malware #ransom #crypt #guardrails #dns #cnc #evasive #domain_generation #remote_access #devices #remotewd #virus #custom_malware #rip #endgame \n\u2022 TrojanDropper\t\t\t\n\u2022 Win32:Evo-gen\t\u2022 Cassini\n\u2022 RansomX-gen\u2022 Zombie.A\n\u2022 win32:MalwareX-gen\t\u2022 Win32:Malware-gen \u2022  Nymeria\n\u2022 Forcud +",
          "modified": "2025-09-11T13:03:18.814000",
          "created": "2025-08-12T19:53:03.953000",
          "tags": [
            "url http",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "entries",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "href",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "body",
            "span",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "united",
            "unknown ns",
            "ip address",
            "creation date",
            "search",
            "present sep",
            "moved",
            "domain add",
            "encrypt",
            "accept",
            "please",
            "passive dns",
            "msie",
            "next associated",
            "html",
            "background",
            "unknown site",
            "div div",
            "trojan",
            "zeus",
            "process32nextw",
            "read c",
            "show",
            "shellexecuteexw",
            "windows nt",
            "wow64",
            "copy",
            "dock",
            "write",
            "malware",
            "unknown",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "august",
            "hybrid",
            "port",
            "destination",
            "tlsv1",
            "as15169",
            "ogoogle trust",
            "cngts ca",
            "execution",
            "next",
            "persistence",
            "data upload",
            "extraction",
            "win32",
            "ransom",
            "trojandropper",
            "mtb nov",
            "forcud",
            "files show",
            "date hash",
            "avast avg"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4179,
            "domain": 774,
            "hostname": 1673,
            "FileHash-MD5": 169,
            "FileHash-SHA1": 110,
            "FileHash-SHA256": 2073,
            "email": 1,
            "SSLCertFingerprint": 13,
            "CVE": 1
          },
          "indicator_count": 8993,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "220 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68958d96a43dd0d3b5a65220",
          "name": "Mirai Communication Networks Inc",
          "description": "BGP Mirai Communication Networks Inc. May be used for Red Hat activities considered enterprise open source solutions. Used for adversarial motives. Abuse.\nResearched a device-local-**********.remotewd.com found in last residential community a monitored target lived.",
          "modified": "2025-09-07T05:03:49.633000",
          "created": "2025-08-08T05:39:34.315000",
          "tags": [
            "united",
            "unknown ns",
            "moved",
            "passive dns",
            "ip address",
            "cloudfront x",
            "hio50 c1",
            "a domains",
            "domains",
            "meta",
            "mirai",
            "apache",
            "url hostname",
            "server response",
            "google safe",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "command",
            "found",
            "mitre att",
            "ck techniques",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "size",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "show technique",
            "ck matrix",
            "adversaries",
            "general",
            "starfield",
            "iframe",
            "onload",
            "status",
            "urls",
            "domain",
            "name servers",
            "hostname",
            "files",
            "files ip",
            "certificate",
            "urls show",
            "results aug",
            "entries",
            "show process",
            "utf8",
            "crlf line",
            "network traffic",
            "title error",
            "next associated",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "meta http",
            "equiv content",
            "win32",
            "trojan",
            "servers",
            "search",
            "whois show",
            "record value",
            "emails",
            "name legal",
            "department name",
            "address po",
            "city seattle",
            "present oct",
            "present jul",
            "present dec",
            "present aug",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "data upload",
            "extraction",
            "include review",
            "exclude sugges",
            "uny inuuue",
            "find s",
            "extr",
            "typ dom",
            "failed",
            "extri data",
            "mirai meta",
            "japan unknown",
            "miraipcok meta",
            "overview ip",
            "address",
            "location united",
            "asn as15169",
            "nameservers",
            "less whois",
            "registrar",
            "overview domain",
            "address domain",
            "ip whois",
            "title",
            "create c",
            "read c",
            "delete",
            "write",
            "medium",
            "create",
            "showing",
            "rgba",
            "next",
            "dock",
            "execution",
            "malware",
            "sqlite rollback",
            "jfif",
            "journal",
            "regsetvalueexa",
            "ascii",
            "regdword",
            "baidu",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "redacted for",
            "unknown aaaa",
            "hostname add",
            "url analysis",
            "encrypt",
            "date",
            "germany unknown",
            "ascio",
            "creation date",
            "alfper",
            "ipv4 add",
            "reverse dns",
            "mozilla",
            "set spray",
            "pty ltd",
            "date checked",
            "present jun",
            "present nov",
            "present may",
            "present mar",
            "present sep",
            "present jan",
            "for privacy",
            "lngen",
            "ransom",
            "virtool",
            "exploit",
            "as133618",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "asn as133618",
            "whois registrar",
            "ietfdtd html",
            "gmt server",
            "debian",
            "dynamicloader",
            "unknown",
            "feat",
            "query",
            "installer",
            "results oct",
            "results jan",
            "aaaa",
            "tlsv1",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "ogoogle trust",
            "cngts ca",
            "lowfi",
            "urlshortner aug",
            "urlshortner jul",
            "urlshortner",
            "write c",
            "high",
            "et exploit",
            "probe ms17010",
            "f codeoverlap",
            "copy",
            "contacted",
            "w3wwhb",
            "svwjh5dd u",
            "uv5b usvwu",
            "f us3v9",
            "cu codeoverlap",
            "filehash",
            "sha256 add",
            "monitored target",
            "sloffeefoundry.com",
            "apple",
            "samsung",
            "galaxy",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "persistence",
            "edge",
            "bing",
            "racism",
            "amazon music",
            "ios",
            "twitter",
            "googleapis",
            "denver"
          ],
          "references": [
            "Researched: 210.172.192.15 | p192015.mirai.ne.jp  | sanso-mirai.jp",
            "Mirai Communication Network Inc. (AS7690) Seto, Japan ASN is a BGP Network",
            "*ccm-command-center.int.m1np.symetra.cloud",
            "Monitored Target/s",
            "https://hybrid-analysis.com/sample/ff37a006ed8677bafa412d653ce9adfe84744702f28f7dfe9f5f4ec51b599419/689505a3a647793a0300f73f",
            "https://hybrid-analysis.com/sample/d30cf86f09e3ab7bb7d0a4ac2608aafb31e07c94fe77f5a264ccdb35fe153c59/689505ded9be5613900509fd",
            "https://hybrid-analysis.com/sample/f6e628e57373bf795bae87c883dcaefdbb720960133edc1adacc6146d10fc88a",
            "https://otx.alienvault.com/indicator/ip/210.172.192.15",
            "https://otx.alienvault.com/indicator/domain/sanso-mirai.jp",
            "device-local-**********. remotewd.com",
            "https://sms-apple.com/login",
            "https://www.exito.com/galaxy-m12-64-gb-negro-samsung-sm-m127fzkkcoo-3016108/p",
            "https://4.img-dpreview.com/files/p/articles/2356747397/samsung_nv24hd_bk.jpeg",
            "https://shell-gift.website/sweeps/de/amazon-voucher/question1000-agg/index.html?uclick=qdlpqnvr&uclickhash=qdlpqnvr-qdlpqnvr-pmwj-0-xsi4-hovr-hoi4-9b6533",
            "api.omgpornpics.com",
            "http://www.mylifelawyer.com/services/denver-affordable-lawyer-child-custody/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Crypt-142",
              "display_name": "Win.Trojan.Crypt-142",
              "target": null
            },
            {
              "id": "#Lowfi:SIGATTR:URLShortner",
              "display_name": "#Lowfi:SIGATTR:URLShortner",
              "target": null
            },
            {
              "id": "Win.Trojan.14278494-1",
              "display_name": "Win.Trojan.14278494-1",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ransom:Win32/WannaCrypt.H",
              "display_name": "ransom:Win32/WannaCrypt.H",
              "target": "/malware/ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Mirai Communications",
              "display_name": "Mirai Communications",
              "target": null
            },
            {
              "id": "Alfper",
              "display_name": "Alfper",
              "target": null
            },
            {
              "id": "telper:HSTR:CLEAN:Ninite",
              "display_name": "telper:HSTR:CLEAN:Ninite",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8962,
            "domain": 1671,
            "hostname": 2125,
            "FileHash-SHA256": 2031,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 523,
            "SSLCertFingerprint": 12,
            "email": 7,
            "CVE": 1
          },
          "indicator_count": 16050,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "224 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "688d9f7c357111d3ad843c16",
          "name": "Follower Factory -  Virus:Win32/Shodi.I | Trojan Agent",
          "description": "Follower factories sell followers , shout outs & retweets to celebrities, businesses, anyone. Buying followers is not encouraged by the those \u2018target\u2019 worked with. On several occasions Brashears had to have Bank refund her $1000\u2019s in unauthorized  Facebook advertising charges finally, 2 of her banks accounts , l Brashears had to delete a photo of herself that gained a suspicious 12,000+ in Filipino likes & comments.. Target deleted 3000 sudden faceless twitter bots shortly before her Twitter accounts was stolen. Bad actors marketed her music on malicious websites. Hacking Tsara  began in 2013 after assault, Followers began after Brian Sabey contacted Tsara Brashears @ Song Culture email. Site became filled with trackers at one time and advertised her commutes on Yandex..1st contact Sabey , initially asked what the company did via email.",
          "modified": "2025-09-01T02:00:30.266000",
          "created": "2025-08-02T05:17:48.231000",
          "tags": [
            "destination",
            "port",
            "united",
            "show",
            "search",
            "get http",
            "host sinkhole",
            "cookie value",
            "et trojan",
            "unknown",
            "possible",
            "write",
            "win32",
            "nivdort",
            "artemis",
            "malware",
            "zeus gameover",
            "copy",
            "next",
            "date",
            "no expiration",
            "ipv4",
            "expiration",
            "url http",
            "domain",
            "iocs",
            "drop or",
            "browse to",
            "select file",
            "or drop",
            "united kingdom",
            "entries",
            "next associated",
            "unknown a",
            "showing",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "md5 add",
            "passive dns",
            "great britain",
            "present jul",
            "urls",
            "files",
            "reverse dns",
            "data upload",
            "extraction",
            "failed",
            "virus",
            "file score",
            "medium risk",
            "related pulses",
            "none related"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 351,
            "FileHash-SHA1": 344,
            "FileHash-SHA256": 1546,
            "URL": 3435,
            "domain": 796,
            "hostname": 801
          },
          "indicator_count": 7273,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "231 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Changed last several digits of gmail account # In example",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht",
        "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
        "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
        "https://www.google-analytics.com/debug/bootstrap?id=\\",
        "Mirai Communication Network Inc. (AS7690) Seto, Japan ASN is a BGP Network",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Alerts : network_http allocates_rwx suspicious_process stealth_window uses_windows_utilities",
        "So both Tsara Brashears & Daisy Coleman have identical stories? No one would help her?",
        "https://hybrid-analysis.com/sample/c61237fcb798f05e6af32a6aa13f8e795aac47559d601eb7f93ad65bcf58b418/68e30c476b91a8000b0dd786",
        "aptia.palantirfoundry.com \u2022 palantirfoundry.com \u2022\u2019agent-infra-mojito.palantirfoundry.com",
        "FireEye was there in 2 year old pulse now removed? I\u2019ll find it.",
        "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
        "api.omgpornpics.com",
        "Since I don\u2019t know Daisy and have zero records except from accounts by someone in a botnet\u2026.",
        "https://securityaffairs.com/144927/cyber-crime~#",
        "There is evidence that Miss Coleman lived and died in Colorado after reporting being stalked.",
        "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "marriott-datacenter-prd.accenture.cn",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://www.founderstack.pro/feedhive \u2022 https://coinbase.getro.com/companies/astar-foundation \u2022 founders-vision.com",
        "https://pegasus.pahamify.com/",
        "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
        "Tesla Hackers  | https://www.teslarati.com/spacex",
        "https://listeners.usw-16.palantirfoundry.com \u2022 https://pacificlife.palantirfoundry.com/",
        "https://otx.alienvault.com/indicator/domain/sanso-mirai.jp",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "http://wg41xm05b3.endgamesystems.com/",
        "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "All tags auto populated including\u2019 Elon Musk\u2019",
        "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
        "Alt + Google \u2018branded\u2019 search engine (monitoring targets searches) YouTube mirroring.",
        "https://shell-gift.website/sweeps/de/amazon-voucher/question1000-agg/index.html?uclick=qdlpqnvr&uclickhash=qdlpqnvr-qdlpqnvr-pmwj-0-xsi4-hovr-hoi4-9b6533",
        "Attackers : Christopher P. Ahmann , Hall Render , Brian Sabey & Co , Foundry , Tulach , Quasi government entities.",
        "Dad drives off road. Daisy raped, bullied, brother driven off road if you ask me",
        "https://uhsinc.palantirfoundry.com/  \u2022 https://velocityglobal.palantirfoundry.com",
        "http://glare.palantirfoundry.com/ \u2022 https://woodward.palantirfoundry.com/",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "internationalfrontier.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.afa33b71-01ea-477c-bc01-f6a3ab623e9d/master",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Audrie & Daisy documentary unknown to any Sexual Assault advocacies across USA. We really researched.",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "https://pegasus.pahamify.com/ \u2022 https://pegasus.pahamify.com/study-plan/ \u2022 pegasus.pahamify.com",
        "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
        "http://josht.ca/portfolio \u2022 http://josht.ca/portfolio/ \u2022 http://p2d.josht.ca/  \u2022 http://pma.josht.ca/  \u2022 http://sa.josht.ca",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "We apologize for so may typos and errors. We strive to do better at that.",
        "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
        "equilibrium.palantirfoundry.com \u2022 kt-presales.palantirfoundry.com  \u2022 paloma.palantirfoundry.com",
        "wg41xm05b3.endgamesystems.com\t\u2022 http://blog.endgamesystems.com",
        "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
        "I would post his public information. It may be unwise.",
        "Daisy was allegedly brutally assaulted by Matthew Barnett,",
        "https://josht.ca/favicon.ico \u2022 https://josht.ca/portfolio/ \u2022 https://josht.ca/portfolio/background.jpg",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "Suspicious apps",
        "https://4.img-dpreview.com/files/p/articles/2356747397/samsung_nv24hd_bk.jpeg",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "According to accounts she was afraid for her life , found to be safe then took her own life?",
        "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
        "We have foot soldiers. Be aware",
        "this.target",
        "Environment Awareness :  Able to access user sensitive domai",
        "jaycobundaberg.eclipseaurahub.com.au 192.168.0.21",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Fireye - FEDNS1.FIREEYE.COM",
        "grafana.ledocloud.com\u2022 192.168.0.21",
        "usw-2-dev.palantirfoundry.com \u2022 lucyw.palantirfoundry.com \u2022 https://fegdip.palantirfoundry.com/",
        "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Requires further research",
        "Foundry Palantir still has a presence in Colorado",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "https://sfmg-testing.palantirfoundry.com\t\u2022 https://signup.palantirfoundry.com/",
        "Mo.Gov associated https://otx.alienvault.com/pulse/6916d97edb28b2616ffac3ab (cloned from OctoSeek)",
        "Tipped of new looming airline threats",
        "pegasuspartners.followupboss.com",
        "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
        "John 12:17",
        "https://p2d.josht.ca/assets/content-delivery/depots/download/ \u2022 https://test.josht.ca/ \u2022",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd458176426a",
        "accenture.cn",
        "Alerts : recono_fingerprint antivm_memory_available",
        "http://dasima-containers.palantirfoundry.com/ \u2022 https://glare.palantirfoundry.com/",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "Alerts :  suspicious_write_exe nids_exploit_alert process_martian injection_resumethread js_eval",
        "http://console.cloud.google.com/appengine",
        "https://www.teslarati.com/tesla-hackers",
        "192-168-0-21.siliconevalley1.direct.quickconnect.to",
        "https://sms-apple.com/login",
        "www.endgame.com",
        "https://310940000.android.com.twitter.android.adsenseformobileapps.com/",
        "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
        "http://www.endgamesystems.com/",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "I need some help.",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "https://tecwebnow.com/sstcp/ss_ct/ct/Foundry-Q124-DE-eBook-The-data-store-for-AI-Landing-page.html?_v_c=MzM3OTU1Nw==sosNjQ0MA==sosNjI5NDA4MDQ=&ide=cmFkb3NsYXcubWFqY3pha0BseW9uZGVsbGJhc2VsbC5jb20=&lbu=eQ==",
        "https://p2d.josht.ca/assets/content \u2022 http://joshwilsonmusic.umg-wp.com/",
        "Is that where they\u2019re getting these names? Rexxfield.com. SMH",
        "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
        "https://publicsector.google/404-page-not-found/\t \u2022 www.founderstack.pro \u2022 oedfoundation.org",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
        "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "*ccm-command-center.int.m1np.symetra.cloud",
        "Running webserver Running WordPress Running Drupal",
        "114.114.114.114 = Tulach",
        "chromeshorts.com mirroring YouTube.com googlechinablog.com \u2022 www.google.com \u2022 108.177.121.105",
        "http://p2d.josht.ca/assets/content-delivery/depots/download/ \u2022 http://staging.josht.\u2022 https://dev.josht.ca/",
        "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
        "IDS Detections Win32/ZonaInstaller Install Beacon",
        "and our limited information, is Daisy a victim or a crisis actor?",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "https://hybrid-analysis.com/sample/d30cf86f09e3ab7bb7d0a4ac2608aafb31e07c94fe77f5a264ccdb35fe153c59/689505ded9be5613900509fd",
        "IDS Detections: SMB-DS IPC$ unicode share access SMB-DS IPC$ share access",
        "git.spywarewatchdog.org",
        "https://apple.btprmjo.cc/",
        "IDS Detections : Possible ETERNALBLUE Probe MS17-010 (MSF style)",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "http://p2d.josht.ca/assets/content-delivery/depots/download",
        "Researched: 210.172.192.15 | p192015.mirai.ne.jp  | sanso-mirai.jp",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
        "Uses code, no phone calls. Connected via instagram.",
        "URL https://mailcatcher.qa2.white-label-dating.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "https://hybrid-analysis.com/sample/ff37a006ed8677bafa412d653ce9adfe84744702f28f7dfe9f5f4ec51b599419/689505a3a647793a0300f73f",
        "http://cr-malware.testpanw.com/url",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "http://acounts.google.com/v/signin/identifier?continue=hts%253%252F2Fconsole.cloud.google.com2Fapengine&dsh=5-1106814258%2539876543210",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "http://3marketeers.org/sstcp/ss_ct/ct/Foundry-US-Palo-Alto-Networks-Q423-The-Complete-Cloud-Security-LP.html?_v_c=MzI5MDQ0OQ==sosODczNzY1sosNTM1NTU5Mjc=&ide=YXZhLmNoYXdsYUBhbGdvc2VjLmNvbQ==&lbu=eQ==",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "IDS Detections: Query to a *.pw domain - Likely Hostile",
        "https://p2d.josht.ca/api/depots/info/?depot=",
        "search.roi.ros.gov.uk",
        "authrootstl.cab common file extension",
        "https://otx.alienvault.com/indicator/ip/210.172.192.15",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com",
        "Targets associated warned. Not very open to advice.",
        "Sometimes pulses are attacked by a delete service. Sometimes people asked to have IoC\u2019s removed.",
        "Next her mom commits suicide, brother died in a one car accident, Fatver died in an accident. Entire family dead?",
        "https://josht.ca/portfolio/style.css \u2022https://sa.josht.ca \u2022 https://staging.josht.ca/",
        "IDS Detections: ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "Daisy dies in the same night she doesn\u2019t want to, Mom decided to join her? No. Murder or HoneyPot tales.",
        "https://hybrid-analysis.com/sample/f6e628e57373bf795bae87c883dcaefdbb720960133edc1adacc6146d10fc88a",
        "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
        "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
        "https://visionayr-live.com/sstcp/ss_at/at/Foundry-Q423-The-Quantified-Benefits-of-Fortinet-Security-Operations-Solutions-lp.html?_v_c=MzE3MDM0Mg==sosMzczODcwsosNDkzNDA4ODI=&lb_email=carine.malessard@idorsia.com&campaign_id=254013&program_id=36356",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
        "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
        "https://www.endgames.us \u2022 https://www.endgames.us/",
        "This is why our team tells a back story. It can and does happen to anyone.",
        "https://blog.endgamesystems.com/\t\u2022 https://blog.endgamesystems.com",
        "https://inbound-message-listener-temporary-testing.palantirfoundry.com",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
        "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
        "://blog.endgamesystems.com/ \u2022 http://httpswww.endgamesystems.com\t URL\thttp://wg41xm05b3.endgamesystems.com",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "https://httpswww.endgamesystems.com\t\u2022 https://wg41xm05b3.endgamesystems.com",
        "bulletproof.palantirapollo.com \u2022 vpn-etuleusj2dpr.palantirclou",
        "http://www.internationalfrontier.com",
        "http://allitlive.com/sstcp/ss_ct/ct/Foundry-Q124-DE-eBook-The-data-store-for-AI-Landing-page.html?_v_c=MzM3OTU1OA==sosNjQ0MA==sosNjI5NDA4MDQ=&ide=cmFkb3NsYXcubWFqY3pha0BseW9uZGVsbGJhc2VsbC5jb20=&lbu=eQ==",
        "Some Colorado communities have been taken over by the State Government",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "https://clockoutbox.es/password",
        "https://pickyhot.disqus.com/tsara-brashears",
        "admin-contact-api.uat2.white-label-dating.com \u2022 capi-sns.qa1.white-label-dating.com \u2022  http://payments.uat1.white-label-dating.com",
        "http://pickyhot.disqus.com/",
        "Matthew grandfather , a powerful local politician & former republican Missouri state representative, Rex Barnett.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
        "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
        "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd45176426a",
        "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
        "Typing a suicide note on social media is suspicious since it could come from your murderer.",
        "https://api.manus.im/api/oauth2_callback/apple",
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy.",
        "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "marriott-control-prd.accenture.cn",
        "116e33e0-8832-11ec-aef5-99a1d044639a-local.solinkcloud.com",
        "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
        "http://truefoundry.prodigaltech.com/",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "https://wes.palantirfoundry.com/ \u2022 http://utilities-bootcamp.palantirfoundry.com/",
        "http://www.mylifelawyer.com/services/denver-affordable-lawyer-child-custody/",
        "According to newspaper accounts and  Daisy Coleman committed suicide in Lakewood , Co  in 2021",
        "https://www.exito.com/galaxy-m12-64-gb-negro-samsung-sm-m127fzkkcoo-3016108/p",
        "appspot.com  \u2022 hyper7install.appspot.com",
        "device-local-de06e551-6b23-4aa3-bb67-6972ae6d30b5.remotewd.com 192.168.0.21",
        "Monitored Target/s",
        "device-local-**********. remotewd.com",
        "test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 p2d.josht.ca pma.josht.ca  \u2022 sa.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
        "https://www.netify.ai/resources/domains \u2022 192-168-0-21.3pt3m9ng2hf.ddns.manage.alta.inc"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Tesla Hackers",
            "Quickstart"
          ],
          "malware_families": [
            "Multiple malware attack",
            "Worm:win32/autorun!atmn",
            "!themida",
            "Win32/madang",
            "Trojan:o97m/madeba.a!det",
            "Trojan:msil/rapidstealer.a",
            "Vd",
            "Unix.dropper.mirai-7135858-0",
            "Win.trojan.14278494-1",
            "Tesla hackers",
            "Alfper",
            "Other malware",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Alf:trojan:win64/psbanker",
            "Win.downloader.small-1966",
            "Emotet",
            "Win.trojan.crypt-142",
            "Tofsee",
            "Virus:win32/sality.at",
            "Win32/scrarev.c",
            "Synacktiv",
            "Node traffic",
            "Pahamify pegasus",
            "Telper:hstr:clean:ninite",
            "Et",
            "Win.trojan.12382640-1",
            "Win32:salicode",
            "Mofksys",
            "Backdoor:win32/tofsee.t",
            "Ransom:win32/wannacrypt.h",
            "Mirai communications",
            "Virtool:win32/vbinder.co",
            "#lowfi:sigattr:urlshortner",
            "Pegasus",
            "Tulach",
            "Bible gateway"
          ],
          "industries": [
            "Technology",
            "Government",
            "Telecommunications"
          ],
          "unique_indicators": 128341
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/emmasedit.com",
    "whois": "http://whois.domaintools.com/emmasedit.com",
    "domain": "emmasedit.com",
    "hostname": "staging.emmasedit.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 20,
  "pulses": [
    {
      "id": "69dc04c12782d2d76c111a93",
      "name": "VirusTotal \u2022 PsBanker \u2022 Attacked / Blocked",
      "description": "",
      "modified": "2026-04-12T20:46:57.338000",
      "created": "2026-04-12T20:46:57.338000",
      "tags": [
        "indicator role",
        "active related",
        "ck ids",
        "files",
        "information",
        "discovery",
        "mitre att",
        "pattern match",
        "ck id",
        "ck matrix",
        "ascii text",
        "united",
        "binary file",
        "april",
        "hybrid",
        "apikey",
        "general",
        "local",
        "path",
        "iframe",
        "click",
        "protocol",
        "learn",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "execution att",
        "related pulses",
        "dll read",
        "function read",
        "icmp traffic",
        "machineguid",
        "systembiosdate",
        "total",
        "read",
        "write",
        "network_icmp",
        "js_eval",
        "recon_fingerprint",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "tls handshake",
        "execution",
        "dock",
        "persistence",
        "malware",
        "unknown",
        "neue",
        "certificate",
        "error",
        "scans show",
        "record value",
        "title site",
        "servers",
        "emails",
        "all hostname",
        "dnsadmin",
        "data upload",
        "extraction",
        "failed",
        "include review",
        "exclude sugges",
        "find s",
        "typ no",
        "active",
        "urls",
        "ip address",
        "asn as54113",
        "registrar",
        "wscript",
        "united states",
        "stcalifornia",
        "lmountain view",
        "ogoogle llc",
        "ogoogle trust",
        "cngts ca",
        "whitelisted",
        "as15169",
        "hostile",
        "crash",
        "contacted",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "detections alf",
        "hostile yara",
        "detections none",
        "less ip",
        "domains",
        "ms windows",
        "intel",
        "pe32",
        "regsetvalueexa",
        "langturkish",
        "sublangdefault",
        "port",
        "destination",
        "entries",
        "worm",
        "delphi",
        "win32",
        "body",
        "explorer",
        "defender",
        "regdword",
        "false",
        "true",
        "end sub",
        "object",
        "createobject",
        "sheetschanged",
        "private sub",
        "string",
        "boolean",
        "cancel",
        "trojan",
        "copy",
        "query",
        "dns update",
        "useragent",
        "myapp",
        "delphi alerts",
        "alerts deadhost",
        "women who code",
        "tulach",
        "114.114.114.114",
        "samuel",
        "brian sabey"
      ],
      "references": [
        "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
        "this.target",
        "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
        "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
        "authrootstl.cab common file extension",
        "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
        "https://securityaffairs.com/144927/cyber-crime~#",
        "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
        "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
        "https://clockoutbox.es/password",
        "http://cr-malware.testpanw.com/url",
        "IDS Detections: Query to a *.pw domain - Likely Hostile",
        "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
        "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
        "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
        "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
        "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
        "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
        "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
        "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
        "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
        "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
        "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
        "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
        "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
        "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
        "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
        "114.114.114.114 = Tulach"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ALF:Trojan:Win64/PsBanker",
          "display_name": "ALF:Trojan:Win64/PsBanker",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Trojan:O97M/Madeba.A!det",
          "display_name": "Trojan:O97M/Madeba.A!det",
          "target": "/malware/Trojan:O97M/Madeba.A!det"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1114,
        "hostname": 594,
        "domain": 200,
        "FileHash-SHA256": 2379,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 259,
        "IPv4": 322,
        "SSLCertFingerprint": 24,
        "email": 2,
        "IPv6": 1
      },
      "indicator_count": 5321,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "7 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69aa019f4509897e354fe029",
      "name": "credit Q Vashti Cloned Pulse ",
      "description": "",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-03-05T22:20:15.324000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "69a2127d12dce12538b57d72",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5644,
        "domain": 701,
        "hostname": 1920,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9877,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a2127d12dce12538b57d72",
      "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
      "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-02-27T21:54:05.261000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5643,
        "domain": 700,
        "hostname": 1918,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9873,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac438a696c993b672106d",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:28.261000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "63 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac4327b5bc2e8be34f78a",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:22.323000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "63 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac416596cd89cf76bce55",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:04:53.997000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "63 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69612a0df518040b20932bef",
      "name": "Pahamify Pegasus | Palantir Malicious delivery via Bible app downloaded from iOS App Store",
      "description": "Pahamify Pegasus | Requires much further research.\nWorking backwards: Targeted device had a Bible Gateway app download by target from both iOS and Android devices. As per report each time app was accessed, iOS became glitched, passwords stolen, drive by compromise on lock screen prompted target to review app. She found the app login was changed to an unknown users name. I tested a (Bible Gateway) URI to see if her belief BG was a honey pot was true. \nThis may take 2-3 more rounds of research. \nIs Pegasus. Is Palantir. Is intrusive and malicious.\n\n[OTC auto generated Title: 2 Timothy 3 NIV - But mark this: There will be terrible - Bible Gateway]",
      "modified": "2026-02-08T15:00:50.749000",
      "created": "2026-01-09T16:17:17.632000",
      "tags": [
        "defense evasion",
        "cor ta0011",
        "techni process",
        "application l",
        "encrypted ch",
        "christ jesus",
        "just",
        "final charge",
        "timothy10",
        "antioch",
        "iconium",
        "lystra",
        "lord",
        "holy scriptures",
        "scripture",
        "bible gateway",
        "no expiration",
        "expiration",
        "a domains",
        "present sep",
        "united",
        "present jun",
        "meta",
        "present oct",
        "present aug",
        "servers",
        "title",
        "data upload",
        "extraction",
        "palantir foundry",
        "listeners",
        "dev",
        "redirects",
        "redirect health",
        "health data",
        "utc google",
        "utc na",
        "script",
        "utc amazon",
        "bible",
        "meta tags",
        "read",
        "bible reading",
        "trackers google",
        "anchor",
        "analyse headers",
        "contenttype",
        "transferenco",
        "connection",
        "date fri",
        "server",
        "read c",
        "as16509",
        "rgba",
        "unicode",
        "execution",
        "dock",
        "write",
        "persistence",
        "jsvendor",
        "jsapp",
        "script script",
        "cssapp",
        "jsfirebase",
        "moved",
        "urls",
        "pegasus",
        "encrypt",
        "script urls",
        "record value",
        "tls handshake",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "next",
        "capture",
        "malware",
        "unknown",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "spawns",
        "access att",
        "t1189 driveby",
        "html",
        "mitre att",
        "ck matrix",
        "ascii text",
        "pattern match",
        "et info",
        "bad traffic",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "adversaries",
        "execution att",
        "t1204 user",
        "t1480 execution",
        "null",
        "refresh",
        "span",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "timothy",
        "search",
        "tag manager",
        "g8t6ln06z40",
        "code",
        "css",
        "js",
        "router",
        "cloudfront",
        "John 12:17",
        "port",
        "yara rule",
        "high",
        "tofsee",
        "rndhex",
        "rndchar",
        "destination",
        "loaderid",
        "lidfileupd",
        "stream"
      ],
      "references": [
        "https://www.biblegateway.com/passage/?search=2%20Timothy%203&version=NIV",
        "https://pegasus.pahamify.com/",
        "aptia.palantirfoundry.com \u2022 palantirfoundry.com \u2022\u2019agent-infra-mojito.palantirfoundry.com",
        "equilibrium.palantirfoundry.com \u2022 kt-presales.palantirfoundry.com  \u2022 paloma.palantirfoundry.com",
        "usw-2-dev.palantirfoundry.com \u2022 lucyw.palantirfoundry.com \u2022 https://fegdip.palantirfoundry.com/",
        "http://dasima-containers.palantirfoundry.com/ \u2022 https://glare.palantirfoundry.com/",
        "https://inbound-message-listener-temporary-testing.palantirfoundry.com",
        "https://listeners.usw-16.palantirfoundry.com \u2022 https://pacificlife.palantirfoundry.com/",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.afa33b71-01ea-477c-bc01-f6a3ab623e9d/master",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "https://sfmg-testing.palantirfoundry.com\t\u2022 https://signup.palantirfoundry.com/",
        "https://uhsinc.palantirfoundry.com/  \u2022 https://velocityglobal.palantirfoundry.com",
        "https://wes.palantirfoundry.com/ \u2022 http://utilities-bootcamp.palantirfoundry.com/",
        "http://glare.palantirfoundry.com/ \u2022 https://woodward.palantirfoundry.com/",
        "https://sfmg-testing.palantirfoundry.com\t\u2022 https://signup.palantirfoundry.com/",
        "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd45176426a",
        "https://paloma.palantirfoundry.com/workspace/module/view/latest/ri.workshop.main.module.cee847ce-7689-42e8-8ca4-bd458176426a",
        "https://pegasus.pahamify.com/ \u2022 https://pegasus.pahamify.com/study-plan/ \u2022 pegasus.pahamify.com",
        "John 12:17"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Bible Gateway",
          "display_name": "Bible Gateway",
          "target": null
        },
        {
          "id": "Pahamify Pegasus",
          "display_name": "Pahamify Pegasus",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        },
        {
          "id": "T1608.005",
          "name": "Link Target",
          "display_name": "T1608.005 - Link Target"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1192",
          "name": "Spearphishing Link",
          "display_name": "T1192 - Spearphishing Link"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6527,
        "hostname": 2450,
        "FileHash-SHA256": 1716,
        "FileHash-MD5": 245,
        "FileHash-SHA1": 134,
        "domain": 1101,
        "email": 3,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 12184,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "70 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693b7dc3cf1996347652ef92",
      "name": "Google Site Redirector - Tesla Hackers",
      "description": "Silencing. By Tesla hackers. Awful example of how any victim of a crime; can become a target of the government..\nThis is especially true when the actual perpetrators work for the government are government affiliated, very wealthy, a celebrity or someone who is deemed important. In this instance the Quasi government sought to keep target seeking and obtaining life saving medical treatment, financial settlement that she was entitled to from assault, injuries from assault, false imprisonment, punitive damgages, pain and suffering, humiliation, premise liability, permanent (whole body disability @MMI ), many other crimes. The victims suffered from a great sadness and betrayal. \n\nObviously racist Elon Musk and crew have access to all government tools. Musk, All things cyber are at his disposal as \ncontinues to abuse privilege.\n They keep  playing a God  they  don\u2019t believe in. God is the Ultimate Avenger.",
      "modified": "2026-01-11T00:03:08.581000",
      "created": "2025-12-12T02:28:19.107000",
      "tags": [
        "compromised_site_redirector_fromcharcode",
        "site_redirector",
        "string",
        "regexp",
        "error",
        "number",
        "sxa0",
        "amptoken",
        "optout",
        "retrieving",
        "notfound",
        "write",
        "form",
        "flash",
        "vd",
        "tesla hackers",
        "nxdomain",
        "passive dns",
        "ip address",
        "domain",
        "a nxdomain",
        "urls",
        "files",
        "ip related",
        "pulses otx",
        "google",
        "unknown",
        "oracle",
        "dynamicloader",
        "medium",
        "high",
        "windows",
        "rndhex",
        "write c",
        "rndchar",
        "displayname",
        "tofsee",
        "yara rule",
        "stream",
        "strings",
        "push",
        "lte all",
        "search otx",
        "ource url",
        "or text",
        "paste",
        "data upload",
        "extraction",
        "elon musk",
        "indicator role",
        "active related",
        "ipv4",
        "exploitsource",
        "url https",
        "url http",
        "desktopinternet",
        "title added",
        "pulses ipv4",
        "less see",
        "ids detections",
        "vuze bt",
        "udp connection",
        "contacted",
        "filehash",
        "av detections",
        "yara detections",
        "alerts",
        "0x8aa42",
        "0xe3107",
        "upnp",
        "http request",
        "bittorrent",
        "file",
        "module load",
        "t1129",
        "post http",
        "install",
        "execution",
        "malware",
        "hostile",
        "crawl",
        "windows nt",
        "wow64",
        "get zona",
        "get httpget",
        "hash",
        "entries",
        "read c",
        "suspicious",
        "next",
        "united"
      ],
      "references": [
        "Tesla Hackers  | https://www.teslarati.com/spacex",
        "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
        "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
        "IDS Detections Win32/ZonaInstaller Install Beacon",
        "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
        "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
        "https://www.google-analytics.com/debug/bootstrap?id=\\",
        "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
        "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
        "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
        "This is why our team tells a back story. It can and does happen to anyone.",
        "We apologize for so may typos and errors. We strive to do better at that."
      ],
      "public": 1,
      "adversary": "Tesla Hackers",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vd",
          "display_name": "Vd",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Trojan.12382640-1",
          "display_name": "Win.Trojan.12382640-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 65,
        "FileHash-SHA1": 34,
        "FileHash-SHA256": 2032,
        "URL": 4921,
        "domain": 567,
        "hostname": 1586,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 9209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "99 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6939d93da11a7d2bf7535ef1",
      "name": "Tesla Hackers Log In | Disqus",
      "description": "I\u2019m not for certain when blog \u2018https://pickyhot.disqus.com/tsara-brashears\u2019 first appeared online. It was present in 2016 -2021.  It was a porn spewing blog that obviously was full of tools. The lot pics debated targets race , beauty and other silly things. I don\u2019t know if target ever clicked on links. Tesla Hackers have played a major role in attacks against target. I haven\u2019t sifted through all malware yet. \n\n\n - Elon Musk - When Brashears suffered attempted hit on roadway she described suspect as an Elon Musk type, possible, offspring, or someone closely tied to him.",
      "modified": "2026-01-09T19:02:12.608000",
      "created": "2025-12-10T20:34:05.903000",
      "tags": [
        "disqus",
        "disqus.com",
        "comments",
        "blog",
        "blogs",
        "discussion",
        "google facebook",
        "twitter",
        "microsoft apple",
        "email",
        "forgot password",
        "login",
        "sign",
        "general full",
        "url https",
        "security tls",
        "united",
        "asn54113",
        "fastly",
        "reverse dns",
        "resource",
        "hash",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "network traffic",
        "t1057",
        "path",
        "learn",
        "command",
        "suspicious",
        "informative",
        "name tactics",
        "spawns",
        "t1480 execution",
        "signing defense",
        "file defense",
        "read c",
        "tlsv1",
        "search",
        "jfif",
        "ijg jpeg",
        "tls handshake",
        "failure",
        "show",
        "port",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "malware",
        "unknown",
        "waymo",
        "tesla",
        "musk",
        "austin",
        "bay area",
        "tesla ceo",
        "elon musk",
        "wednesday",
        "safety monitor",
        "synacktiv",
        "aaaa",
        "present jul",
        "status",
        "asnone country",
        "as13335",
        "present sep",
        "present apr",
        "present dec",
        "present jun",
        "lte all",
        "search otx",
        "additionally",
        "enter source",
        "url or",
        "data upload",
        "extraction",
        "entries",
        "present may",
        "dynamicloader",
        "as15169",
        "medium",
        "write c",
        "odigicert inc",
        "windows",
        "as54113",
        "worm",
        "copy",
        "explorer",
        "encrypt",
        "target tsraa brashears"
      ],
      "references": [
        "http://pickyhot.disqus.com/",
        "https://www.teslarati.com/tesla-hackers",
        "https://pickyhot.disqus.com/tsara-brashears",
        "All tags auto populated including\u2019 Elon Musk\u2019",
        "Running webserver Running WordPress Running Drupal",
        "bulletproof.palantirapollo.com \u2022 vpn-etuleusj2dpr.palantirclou",
        "https://publicsector.google/404-page-not-found/\t \u2022 www.founderstack.pro \u2022 oedfoundation.org",
        "https://www.founderstack.pro/feedhive \u2022 https://coinbase.getro.com/companies/astar-foundation \u2022 founders-vision.com",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "www.endgame.com",
        "://blog.endgamesystems.com/ \u2022 http://httpswww.endgamesystems.com\t URL\thttp://wg41xm05b3.endgamesystems.com",
        "https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com\t\u2022 http://blog.endgamesystems.com",
        "https://httpswww.endgamesystems.com\t\u2022 https://wg41xm05b3.endgamesystems.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com",
        "https://blog.endgamesystems.com/\t\u2022 https://blog.endgamesystems.com",
        "http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/",
        "http://www.endgamesystems.com/",
        "Requires further research"
      ],
      "public": 1,
      "adversary": "Tesla Hackers",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Synacktiv",
          "display_name": "Synacktiv",
          "target": null
        },
        {
          "id": "Tesla Hackers",
          "display_name": "Tesla Hackers",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Mofksys",
          "display_name": "Mofksys",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2523,
        "URL": 6583,
        "FileHash-SHA256": 1132,
        "domain": 1483,
        "FileHash-SHA1": 43,
        "SSLCertFingerprint": 17,
        "FileHash-MD5": 109,
        "email": 2
      },
      "indicator_count": 11892,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "100 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693596f8cd50958de6e9415c",
      "name": "Eternal Blue Probe - YouTube - GSE",
      "description": "EternalBlue is an exploit that targets a critical vulnerability (CVE-2017-0144, part of the larger MS17-010 security bulletin) in Microsoft's implementation of the Server Message Block (SMB) version 1 (SMBv1) protocol, which is used for file and printer sharing on Windows networks. \nVulnerability: The flaw allows an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system by sending specially crafted packets to the SMBv1 server.\nOrigin: The exploit was developed by the NSA but was stolen and publicly leaked in April 2017 by a hacker group known as the Shadow Brokers.\nMajor Attacks: Shortly after its leak, EternalBlue was used in major, widespread cyberattacks, most notably the WannaCry and NotPetya ransomware outbreaks, which caused massive global disruption. The self-propagating \"wormable\" nature of the exploit allowed malware to spread rapidly across networks.",
      "modified": "2026-01-06T00:03:32.099000",
      "created": "2025-12-07T15:02:16.840000",
      "tags": [
        "asn as8068",
        "cloud provider",
        "reverse dns",
        "america flag",
        "united",
        "america asn",
        "as8068",
        "united states",
        "avast avg",
        "ids detections",
        "yara detections",
        "probe ms17010",
        "smbds ipc",
        "av detections",
        "alerts",
        "read c",
        "medium",
        "rgba",
        "unicode",
        "msf style",
        "dock",
        "write",
        "execution",
        "malware",
        "eternal blue",
        "check in",
        "file score",
        "medium risk",
        "generic flags",
        "ms17010",
        "none alerts",
        "less ip",
        "contacted",
        "matches",
        "mirroring",
        "chromeshorts",
        "gse",
        "google",
        "youtube",
        "dating apps",
        "suspicious apps",
        "search engine",
        "redirect",
        "eternalblue"
      ],
      "references": [
        "chromeshorts.com mirroring YouTube.com googlechinablog.com \u2022 www.google.com \u2022 108.177.121.105",
        "IDS Detections: ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "IDS Detections : Possible ETERNALBLUE Probe MS17-010 (MSF style)",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "IDS Detections: SMB-DS IPC$ unicode share access SMB-DS IPC$ share access",
        "Environment Awareness :  Able to access user sensitive domai",
        "Alerts :  suspicious_write_exe nids_exploit_alert process_martian injection_resumethread js_eval",
        "Alerts : network_http allocates_rwx suspicious_process stealth_window uses_windows_utilities",
        "Alerts : recono_fingerprint antivm_memory_available",
        "www.endgame.com",
        "admin-contact-api.uat2.white-label-dating.com \u2022 capi-sns.qa1.white-label-dating.com \u2022  http://payments.uat1.white-label-dating.com",
        "URL https://mailcatcher.qa2.white-label-dating.com",
        "Attackers : Christopher P. Ahmann , Hall Render , Brian Sabey & Co , Foundry , Tulach , Quasi government entities.",
        "Alt + Google \u2018branded\u2019 search engine (monitoring targets searches) YouTube mirroring.",
        "Suspicious apps"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 449,
        "FileHash-MD5": 26,
        "FileHash-SHA1": 6,
        "FileHash-SHA256": 169,
        "URL": 719,
        "domain": 86,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 1456,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "104 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://staging.emmasedit.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://staging.emmasedit.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776660811.153801
}