{
  "type": "URL",
  "indicator": "https://static-xml.vespymedia.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://static-xml.vespymedia.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4114602265,
      "indicator": "https://static-xml.vespymedia.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "69afd95e9073ee0f67be8694",
          "name": "URLSpirit Spyware | Targeted Device attacks | MITM attacks | AI and Browser Attacks",
          "description": "",
          "modified": "2026-04-09T08:02:04.521000",
          "created": "2026-03-10T08:42:06.133000",
          "tags": [
            "msie",
            "chrome",
            "search",
            "united",
            "unknown ns",
            "taiwan unknown",
            "requested range",
            "ip address",
            "taiwan",
            "title",
            "tlsv1",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "unknown",
            "encrypt",
            "malware",
            "suspicious",
            "learn",
            "informative",
            "ck id",
            "name tactics",
            "command",
            "spawns",
            "found",
            "id name",
            "malicious",
            "over",
            "ascii text",
            "pattern match",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "http",
            "data upload",
            "enter scords",
            "one on",
            "extraction",
            "http request",
            "checkin",
            "observed dns",
            "query",
            "dns query",
            "domain",
            "lila windows",
            "all se",
            "file version",
            "product vers",
            "failed",
            "included ic",
            "review iocs",
            "ic data",
            "status",
            "ch ua",
            "emails",
            "servers",
            "for privacy",
            "record value",
            "trojan",
            "pegasus",
            "body",
            "palantir",
            "se antivirus",
            "ids deted",
            "domains",
            "tachnalnav dan",
            "origin",
            "pe versio",
            "include review",
            "exclude sugges",
            "stop data",
            "q search",
            "product",
            "contact data",
            "contact urlspirit",
            "url http",
            "hostname",
            "url https",
            "stop show",
            "types",
            "type",
            "indicator",
            "defense evasion",
            "sha1",
            "legalcopyngn",
            "copyugnt zur",
            "fileversic data",
            "exclude data",
            "no expiration",
            "ipv4",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "macintosh",
            "khtml",
            "type indicator",
            "iocs",
            "sc type",
            "hong kong",
            "certificate",
            "enterprise",
            "adversaries",
            "evasion att",
            "urlspirit",
            "targeted att",
            "monitored target",
            "browser attacks",
            "ai chat",
            "next level",
            "quasi",
            "apple",
            "android",
            "windows"
          ],
          "references": [
            "Exploit Source: 210.64.137.210 | IP\u4f4d\u5740\u8cc7\u8a0a\uff08210.64.0.0 tw.ntunhs.net)",
            "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "Antivirus Detections: Win.Trojan.Agent-1190546",
            "IDS Detections: URLSpirit Spyware Checkin Observed DNS Query to Suspicious Domain adz2you[.]com",
            "IDS Detections: DNS Query for Suspicious .cf Domain HTTP Request to a *.xyz domain",
            "Alerts: network_icmp persistence_autorun disables_proxy modifies_certificates",
            "Alerts: modifies_proxy_wpad  ransomware_dropped_files ransomware_mass_file_delete",
            "Alerts: dumped_buffer network_cnc_http network_http network_http_post suspicious_tld",
            "Alerts: allocates_rwx antisandbox_foregroundwindows antisandbox_sleep antivm_disk_size",
            "Alerts: origin_langid creates_exe injection_process_search multiple_useragents",
            "Domains Contacted: r4---sn-5goeen7d.googlevideo.com s23.cnzz.com www.youtube.com",
            "Domains Contacted: c.cnzz.com crl.comodoca4.com ocsp2.globalsign.com a.exdynsrv.com",
            "Domains Contacted: www.wanuu2.club xml.admidainsight.com www.gstatic.com .",
            "Indicator deletion during pulse | Requires more research | Positive for MITM attack",
            "IP\u2019s Contacted: 103.23.108.110  103.23.108.112  103.23.108.114  103.23.108.124  103.23.108.140",
            "IP\u2019s Contacted: 103.23.108.184  103.23.108.220  103.23.108.80  103.23.108.92  104.18.20.226",
            "URLSpirit Spyware",
            "Palantir\u2019s PIT - Prometheus Intelligence Technology Damaging Spyware distribution, AI Man in the Middle Attacks",
            "Origin: https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
            "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "PE Version Information :  LegalCopyright: Copyright 2012 Spiritsoft All Rights Reserved. InternalName\tjingling.exe",
            "FileVersion: 2013.10.10.100 Company Name: \u7cbe\u7075\u8f6f\u4ef6 Comments: \u6d41\u91cf\u7cbe\u7075(1094) ProductName: \u6d41\u91cf\u7cbe\u7075",
            "Product Version: 4.0.3.1 File Description: \u6d41\u91cf\u7cbe\u7075 Original File name: jingling.exe",
            "023097.palantir.events \u2022 palantir.events \u2022 url3561.palantir.events",
            "13.32.178.127 \u2022 023097.palantir.events \u2022 palantir.events \u2022 Email admin@dnstinations.com",
            "www.palantir.events  \u2022 Email cirt@palantir.com \u2022 0055-b2b-nonprod-bigip1.palantir.events \u2022",
            "151-80-200-88.palantir.events \u2022 196-196-19-74.palantir.events",
            "http://www.net-chinese.com.tw \u2022 pixanalytics.com \u2022 pixnet.cc \u2022 pixnet.tv",
            "quecompegasune.tk \u2022 hipicapegaso.com",
            "This is part of a Prometheus Intelligence Technology (PIT) Palantir Attack",
            "Incredibly false information, white screens , pink screens and chat erasure",
            "Definitely requires further research",
            "Pegasus Indicators deleted during pulse"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "URLSpirit",
              "display_name": "URLSpirit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            }
          ],
          "industries": [
            "Technology",
            "Government",
            "Defense"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 406,
            "FileHash-SHA1": 391,
            "FileHash-SHA256": 5770,
            "URL": 7299,
            "domain": 1307,
            "email": 13,
            "hostname": 2162,
            "CVE": 3,
            "SSLCertFingerprint": 45
          },
          "indicator_count": 17396,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6905d40f781d7d58d4021a20",
          "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
          "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
          "modified": "2025-12-20T06:00:23.758000",
          "created": "2025-11-01T09:34:07.323000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8332,
            "domain": 4819,
            "hostname": 2165,
            "FileHash-SHA256": 7369,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 23637,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906c12b1dd6a64ab1beaa55",
          "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-02T02:25:47.431000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69137ee5d76d486d65396af0",
          "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-11T18:22:29.976000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6893032410060f658d862c60",
          "name": "Hosting App - Partial research | Emotet Worm",
          "description": "#firebase #google #dark_web_hosting #ransom #tracking #locate #monitored_targets #worm #emotet #malware #remoted_devices #trojan #reputation\n\n\u2022 Targets likely unaware.\n\n[m.pornsexer.xxx.3.1.adiosfil.roksit.net - reputation tool]",
          "modified": "2025-09-05T07:00:00.711000",
          "created": "2025-08-06T07:24:20.645000",
          "tags": [
            "url https",
            "iocs",
            "learn more",
            "ipv4",
            "domain",
            "hostname",
            "types of",
            "sweden",
            "united",
            "belgium",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "showing",
            "document file",
            "v2 document",
            "search",
            "medium",
            "ms windows",
            "vista event",
            "port",
            "msie",
            "windows nt",
            "wow64",
            "dirty",
            "write",
            "powershell",
            "copy",
            "next",
            "defender",
            "dynamicloader",
            "high",
            "fwlink",
            "windows",
            "cmd c",
            "alerts",
            "bios",
            "related pulses",
            "pulses",
            "related tags",
            "file type",
            "ascii text",
            "sha256",
            "external",
            "virustotal api",
            "screenshots",
            "june",
            "flag",
            "usa windows",
            "input threat",
            "level analysis",
            "summary",
            "gbrflag",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "ssl certificate",
            "defense evasion",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "size",
            "mitre att",
            "date",
            "path",
            "format",
            "august",
            "hybrid",
            "local",
            "form",
            "click",
            "strings",
            "ubar",
            "truetype",
            "web open",
            "font format",
            "description web",
            "general",
            "iframe",
            "slcc2",
            "media center",
            "destination",
            "tlsv1",
            "unknown",
            "execution",
            "dock",
            "persistence",
            "malware",
            "encrypt",
            "ck techniques",
            "read c",
            "show",
            "entries",
            "delete",
            "data upload",
            "extraction",
            "onlv",
            "find",
            "type",
            "no matching",
            "indicator",
            "mtb may",
            "trojandropper",
            "passive dns",
            "next associated",
            "lowfi",
            "gmt cache",
            "sameorigin",
            "ipv4 add",
            "trojan",
            "mtb apr",
            "files show",
            "date hash",
            "avast avg",
            "shellterlod may",
            "win32qqpass apr",
            "trojanspy",
            "ransom",
            "wiper",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results aug",
            "urls show",
            "hookwowlow may"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4593,
            "hostname": 1754,
            "domain": 399,
            "FileHash-SHA256": 2128,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 299,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68930449988277cd29c25cb7",
          "name": "https://firebase.google.com/ - Ransom \u2022 Wiper\u2022 Trojan dropper",
          "description": "",
          "modified": "2025-09-05T07:00:00.711000",
          "created": "2025-08-06T07:29:13.136000",
          "tags": [
            "url https",
            "iocs",
            "learn more",
            "ipv4",
            "domain",
            "hostname",
            "types of",
            "sweden",
            "united",
            "belgium",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "showing",
            "document file",
            "v2 document",
            "search",
            "medium",
            "ms windows",
            "vista event",
            "port",
            "msie",
            "windows nt",
            "wow64",
            "dirty",
            "write",
            "powershell",
            "copy",
            "next",
            "defender",
            "dynamicloader",
            "high",
            "fwlink",
            "windows",
            "cmd c",
            "alerts",
            "bios",
            "related pulses",
            "pulses",
            "related tags",
            "file type",
            "ascii text",
            "sha256",
            "external",
            "virustotal api",
            "screenshots",
            "june",
            "flag",
            "usa windows",
            "input threat",
            "level analysis",
            "summary",
            "gbrflag",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "ssl certificate",
            "defense evasion",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "size",
            "mitre att",
            "date",
            "path",
            "format",
            "august",
            "hybrid",
            "local",
            "form",
            "click",
            "strings",
            "ubar",
            "truetype",
            "web open",
            "font format",
            "description web",
            "general",
            "iframe",
            "slcc2",
            "media center",
            "destination",
            "tlsv1",
            "unknown",
            "execution",
            "dock",
            "persistence",
            "malware",
            "encrypt",
            "ck techniques",
            "read c",
            "show",
            "entries",
            "delete",
            "data upload",
            "extraction",
            "onlv",
            "find",
            "type",
            "no matching",
            "indicator",
            "mtb may",
            "trojandropper",
            "passive dns",
            "next associated",
            "lowfi",
            "gmt cache",
            "sameorigin",
            "ipv4 add",
            "trojan",
            "mtb apr",
            "files show",
            "date hash",
            "avast avg",
            "shellterlod may",
            "win32qqpass apr",
            "trojanspy",
            "ransom",
            "wiper",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results aug",
            "urls show",
            "hookwowlow may"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6893032410060f658d862c60",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4593,
            "hostname": 1754,
            "domain": 399,
            "FileHash-SHA256": 2128,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 299,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "quecompegasune.tk \u2022 hipicapegaso.com",
        "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "Domains Contacted: c.cnzz.com crl.comodoca4.com ocsp2.globalsign.com a.exdynsrv.com",
        "Indicator deletion during pulse | Requires more research | Positive for MITM attack",
        "www.palantir.events  \u2022 Email cirt@palantir.com \u2022 0055-b2b-nonprod-bigip1.palantir.events \u2022",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Alerts: dumped_buffer network_cnc_http network_http network_http_post suspicious_tld",
        "Origin: https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
        "Alerts: network_icmp persistence_autorun disables_proxy modifies_certificates",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Product Version: 4.0.3.1 File Description: \u6d41\u91cf\u7cbe\u7075 Original File name: jingling.exe",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "http://www.net-chinese.com.tw \u2022 pixanalytics.com \u2022 pixnet.cc \u2022 pixnet.tv",
        "FileVersion: 2013.10.10.100 Company Name: \u7cbe\u7075\u8f6f\u4ef6 Comments: \u6d41\u91cf\u7cbe\u7075(1094) ProductName: \u6d41\u91cf\u7cbe\u7075",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "13.32.178.127 \u2022 023097.palantir.events \u2022 palantir.events \u2022 Email admin@dnstinations.com",
        "PE Version Information :  LegalCopyright: Copyright 2012 Spiritsoft All Rights Reserved. InternalName\tjingling.exe",
        "Pegasus Indicators deleted during pulse",
        "IDS Detections: URLSpirit Spyware Checkin Observed DNS Query to Suspicious Domain adz2you[.]com",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Antivirus Detections: Win.Trojan.Agent-1190546",
        "Domains Contacted: r4---sn-5goeen7d.googlevideo.com s23.cnzz.com www.youtube.com",
        "Incredibly false information, white screens , pink screens and chat erasure",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "151-80-200-88.palantir.events \u2022 196-196-19-74.palantir.events",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "IP\u2019s Contacted: 103.23.108.110  103.23.108.112  103.23.108.114  103.23.108.124  103.23.108.140",
        "This is part of a Prometheus Intelligence Technology (PIT) Palantir Attack",
        "Alerts: modifies_proxy_wpad  ransomware_dropped_files ransomware_mass_file_delete",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "023097.palantir.events \u2022 palantir.events \u2022 url3561.palantir.events",
        "IP\u2019s Contacted: 103.23.108.184  103.23.108.220  103.23.108.80  103.23.108.92  104.18.20.226",
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "Alerts: origin_langid creates_exe injection_process_search multiple_useragents",
        "Definitely requires further research",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Doing any evil thing for mone does not compute for me.",
        "URLSpirit Spyware",
        "Exploit Source: 210.64.137.210 | IP\u4f4d\u5740\u8cc7\u8a0a\uff08210.64.0.0 tw.ntunhs.net)",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "IDS Detections: DNS Query for Suspicious .cf Domain HTTP Request to a *.xyz domain",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "Domains Contacted: www.wanuu2.club xml.admidainsight.com www.gstatic.com .",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "Palantir\u2019s PIT - Prometheus Intelligence Technology Damaging Spyware distribution, AI Man in the Middle Attacks",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "Alerts: allocates_rwx antisandbox_foregroundwindows antisandbox_sleep antivm_disk_size"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.unsafe",
            "Expiro",
            "Trojan:win32/generic",
            "Trojan:win32/qshell",
            "Urlspirit",
            "Other",
            "Juko",
            "Win.malware.qshell-9875653-0"
          ],
          "industries": [
            "Healthcare",
            "Telecommunications",
            "Technology",
            "Government",
            "Defense",
            "Legal"
          ],
          "unique_indicators": 49707
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/vespymedia.com",
    "whois": "http://whois.domaintools.com/vespymedia.com",
    "domain": "vespymedia.com",
    "hostname": "static-xml.vespymedia.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "69afd95e9073ee0f67be8694",
      "name": "URLSpirit Spyware | Targeted Device attacks | MITM attacks | AI and Browser Attacks",
      "description": "",
      "modified": "2026-04-09T08:02:04.521000",
      "created": "2026-03-10T08:42:06.133000",
      "tags": [
        "msie",
        "chrome",
        "search",
        "united",
        "unknown ns",
        "taiwan unknown",
        "requested range",
        "ip address",
        "taiwan",
        "title",
        "tlsv1",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "stcalifornia",
        "lmountain view",
        "ogoogle llc",
        "unknown",
        "encrypt",
        "malware",
        "suspicious",
        "learn",
        "informative",
        "ck id",
        "name tactics",
        "command",
        "spawns",
        "found",
        "id name",
        "malicious",
        "over",
        "ascii text",
        "pattern match",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "http",
        "data upload",
        "enter scords",
        "one on",
        "extraction",
        "http request",
        "checkin",
        "observed dns",
        "query",
        "dns query",
        "domain",
        "lila windows",
        "all se",
        "file version",
        "product vers",
        "failed",
        "included ic",
        "review iocs",
        "ic data",
        "status",
        "ch ua",
        "emails",
        "servers",
        "for privacy",
        "record value",
        "trojan",
        "pegasus",
        "body",
        "palantir",
        "se antivirus",
        "ids deted",
        "domains",
        "tachnalnav dan",
        "origin",
        "pe versio",
        "include review",
        "exclude sugges",
        "stop data",
        "q search",
        "product",
        "contact data",
        "contact urlspirit",
        "url http",
        "hostname",
        "url https",
        "stop show",
        "types",
        "type",
        "indicator",
        "defense evasion",
        "sha1",
        "legalcopyngn",
        "copyugnt zur",
        "fileversic data",
        "exclude data",
        "no expiration",
        "ipv4",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "macintosh",
        "khtml",
        "type indicator",
        "iocs",
        "sc type",
        "hong kong",
        "certificate",
        "enterprise",
        "adversaries",
        "evasion att",
        "urlspirit",
        "targeted att",
        "monitored target",
        "browser attacks",
        "ai chat",
        "next level",
        "quasi",
        "apple",
        "android",
        "windows"
      ],
      "references": [
        "Exploit Source: 210.64.137.210 | IP\u4f4d\u5740\u8cc7\u8a0a\uff08210.64.0.0 tw.ntunhs.net)",
        "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "Antivirus Detections: Win.Trojan.Agent-1190546",
        "IDS Detections: URLSpirit Spyware Checkin Observed DNS Query to Suspicious Domain adz2you[.]com",
        "IDS Detections: DNS Query for Suspicious .cf Domain HTTP Request to a *.xyz domain",
        "Alerts: network_icmp persistence_autorun disables_proxy modifies_certificates",
        "Alerts: modifies_proxy_wpad  ransomware_dropped_files ransomware_mass_file_delete",
        "Alerts: dumped_buffer network_cnc_http network_http network_http_post suspicious_tld",
        "Alerts: allocates_rwx antisandbox_foregroundwindows antisandbox_sleep antivm_disk_size",
        "Alerts: origin_langid creates_exe injection_process_search multiple_useragents",
        "Domains Contacted: r4---sn-5goeen7d.googlevideo.com s23.cnzz.com www.youtube.com",
        "Domains Contacted: c.cnzz.com crl.comodoca4.com ocsp2.globalsign.com a.exdynsrv.com",
        "Domains Contacted: www.wanuu2.club xml.admidainsight.com www.gstatic.com .",
        "Indicator deletion during pulse | Requires more research | Positive for MITM attack",
        "IP\u2019s Contacted: 103.23.108.110  103.23.108.112  103.23.108.114  103.23.108.124  103.23.108.140",
        "IP\u2019s Contacted: 103.23.108.184  103.23.108.220  103.23.108.80  103.23.108.92  104.18.20.226",
        "URLSpirit Spyware",
        "Palantir\u2019s PIT - Prometheus Intelligence Technology Damaging Spyware distribution, AI Man in the Middle Attacks",
        "Origin: https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
        "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "PE Version Information :  LegalCopyright: Copyright 2012 Spiritsoft All Rights Reserved. InternalName\tjingling.exe",
        "FileVersion: 2013.10.10.100 Company Name: \u7cbe\u7075\u8f6f\u4ef6 Comments: \u6d41\u91cf\u7cbe\u7075(1094) ProductName: \u6d41\u91cf\u7cbe\u7075",
        "Product Version: 4.0.3.1 File Description: \u6d41\u91cf\u7cbe\u7075 Original File name: jingling.exe",
        "023097.palantir.events \u2022 palantir.events \u2022 url3561.palantir.events",
        "13.32.178.127 \u2022 023097.palantir.events \u2022 palantir.events \u2022 Email admin@dnstinations.com",
        "www.palantir.events  \u2022 Email cirt@palantir.com \u2022 0055-b2b-nonprod-bigip1.palantir.events \u2022",
        "151-80-200-88.palantir.events \u2022 196-196-19-74.palantir.events",
        "http://www.net-chinese.com.tw \u2022 pixanalytics.com \u2022 pixnet.cc \u2022 pixnet.tv",
        "quecompegasune.tk \u2022 hipicapegaso.com",
        "This is part of a Prometheus Intelligence Technology (PIT) Palantir Attack",
        "Incredibly false information, white screens , pink screens and chat erasure",
        "Definitely requires further research",
        "Pegasus Indicators deleted during pulse"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "URLSpirit",
          "display_name": "URLSpirit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        }
      ],
      "industries": [
        "Technology",
        "Government",
        "Defense"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 406,
        "FileHash-SHA1": 391,
        "FileHash-SHA256": 5770,
        "URL": 7299,
        "domain": 1307,
        "email": 13,
        "hostname": 2162,
        "CVE": 3,
        "SSLCertFingerprint": 45
      },
      "indicator_count": 17396,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "10 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6905d40f781d7d58d4021a20",
      "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
      "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
      "modified": "2025-12-20T06:00:23.758000",
      "created": "2025-11-01T09:34:07.323000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8332,
        "domain": 4819,
        "hostname": 2165,
        "FileHash-SHA256": 7369,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 23637,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "120 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906c12b1dd6a64ab1beaa55",
      "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-02T02:25:47.431000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69137ee5d76d486d65396af0",
      "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-11T18:22:29.976000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6893032410060f658d862c60",
      "name": "Hosting App - Partial research | Emotet Worm",
      "description": "#firebase #google #dark_web_hosting #ransom #tracking #locate #monitored_targets #worm #emotet #malware #remoted_devices #trojan #reputation\n\n\u2022 Targets likely unaware.\n\n[m.pornsexer.xxx.3.1.adiosfil.roksit.net - reputation tool]",
      "modified": "2025-09-05T07:00:00.711000",
      "created": "2025-08-06T07:24:20.645000",
      "tags": [
        "url https",
        "iocs",
        "learn more",
        "ipv4",
        "domain",
        "hostname",
        "types of",
        "sweden",
        "united",
        "belgium",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "showing",
        "document file",
        "v2 document",
        "search",
        "medium",
        "ms windows",
        "vista event",
        "port",
        "msie",
        "windows nt",
        "wow64",
        "dirty",
        "write",
        "powershell",
        "copy",
        "next",
        "defender",
        "dynamicloader",
        "high",
        "fwlink",
        "windows",
        "cmd c",
        "alerts",
        "bios",
        "related pulses",
        "pulses",
        "related tags",
        "file type",
        "ascii text",
        "sha256",
        "external",
        "virustotal api",
        "screenshots",
        "june",
        "flag",
        "usa windows",
        "input threat",
        "level analysis",
        "summary",
        "gbrflag",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "ssl certificate",
        "defense evasion",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "size",
        "mitre att",
        "date",
        "path",
        "format",
        "august",
        "hybrid",
        "local",
        "form",
        "click",
        "strings",
        "ubar",
        "truetype",
        "web open",
        "font format",
        "description web",
        "general",
        "iframe",
        "slcc2",
        "media center",
        "destination",
        "tlsv1",
        "unknown",
        "execution",
        "dock",
        "persistence",
        "malware",
        "encrypt",
        "ck techniques",
        "read c",
        "show",
        "entries",
        "delete",
        "data upload",
        "extraction",
        "onlv",
        "find",
        "type",
        "no matching",
        "indicator",
        "mtb may",
        "trojandropper",
        "passive dns",
        "next associated",
        "lowfi",
        "gmt cache",
        "sameorigin",
        "ipv4 add",
        "trojan",
        "mtb apr",
        "files show",
        "date hash",
        "avast avg",
        "shellterlod may",
        "win32qqpass apr",
        "trojanspy",
        "ransom",
        "wiper",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results aug",
        "urls show",
        "hookwowlow may"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4593,
        "hostname": 1754,
        "domain": 399,
        "FileHash-SHA256": 2128,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 299,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68930449988277cd29c25cb7",
      "name": "https://firebase.google.com/ - Ransom \u2022 Wiper\u2022 Trojan dropper",
      "description": "",
      "modified": "2025-09-05T07:00:00.711000",
      "created": "2025-08-06T07:29:13.136000",
      "tags": [
        "url https",
        "iocs",
        "learn more",
        "ipv4",
        "domain",
        "hostname",
        "types of",
        "sweden",
        "united",
        "belgium",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "showing",
        "document file",
        "v2 document",
        "search",
        "medium",
        "ms windows",
        "vista event",
        "port",
        "msie",
        "windows nt",
        "wow64",
        "dirty",
        "write",
        "powershell",
        "copy",
        "next",
        "defender",
        "dynamicloader",
        "high",
        "fwlink",
        "windows",
        "cmd c",
        "alerts",
        "bios",
        "related pulses",
        "pulses",
        "related tags",
        "file type",
        "ascii text",
        "sha256",
        "external",
        "virustotal api",
        "screenshots",
        "june",
        "flag",
        "usa windows",
        "input threat",
        "level analysis",
        "summary",
        "gbrflag",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "ssl certificate",
        "defense evasion",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "size",
        "mitre att",
        "date",
        "path",
        "format",
        "august",
        "hybrid",
        "local",
        "form",
        "click",
        "strings",
        "ubar",
        "truetype",
        "web open",
        "font format",
        "description web",
        "general",
        "iframe",
        "slcc2",
        "media center",
        "destination",
        "tlsv1",
        "unknown",
        "execution",
        "dock",
        "persistence",
        "malware",
        "encrypt",
        "ck techniques",
        "read c",
        "show",
        "entries",
        "delete",
        "data upload",
        "extraction",
        "onlv",
        "find",
        "type",
        "no matching",
        "indicator",
        "mtb may",
        "trojandropper",
        "passive dns",
        "next associated",
        "lowfi",
        "gmt cache",
        "sameorigin",
        "ipv4 add",
        "trojan",
        "mtb apr",
        "files show",
        "date hash",
        "avast avg",
        "shellterlod may",
        "win32qqpass apr",
        "trojanspy",
        "ransom",
        "wiper",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results aug",
        "urls show",
        "hookwowlow may"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6893032410060f658d862c60",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4593,
        "hostname": 1754,
        "domain": 399,
        "FileHash-SHA256": 2128,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 299,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://static-xml.vespymedia.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://static-xml.vespymedia.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776611283.2354162
}