{
  "type": "URL",
  "indicator": "https://static.blendle.nl/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://static.blendle.nl/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4119873942,
      "indicator": "https://static.blendle.nl/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "69a3c685d4b7c139ffe62930",
          "name": "Clone Pulse Reference",
          "description": "",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-03-01T04:54:29.384000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6906bd99cadbd4140014c6af",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 454,
            "hostname": 1404,
            "URL": 3557,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 6754,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906bd99cadbd4140014c6af",
          "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
          "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
          "modified": "2025-12-02T01:05:30.331000",
          "created": "2025-11-02T02:10:33.546000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 449,
            "hostname": 1403,
            "URL": 3552,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1
          },
          "indicator_count": 6742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "138 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a1ef2dd26ec62a3c298c",
          "name": "Listeners - Malicious Over the top espionage | Cyber Warfare?",
          "description": "Cyber attacks on targeted devices stored safely, separately, don\u2019t communicate with one another. PalantirFoundry.com shares IP addresses with Fastly. South African IP\u2019s and DGA domains bounce from US Denver , Co based IP and Domain addresses. Registrar Abuse: HTTP/2 404 content type: text/html content length: 2263 date: Wed 22 Oct 2025 22:32:18 GMT server: Envoy\n443 Certificate Subject: US\n443 Certificate Subject: Colorado\n443 Certificate Subject: Denver\n443 Certificate Subject: Palantir Technologies Inc.\n443 Certificate Subject: listeners.usw-19.palantirfoundry.com",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:33:03.315000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 180,
          "modified_text": "148 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a6f4e35193c04401daaf",
          "name": "Emotet & VirTool Obsfuscator - Registrar abuse tracking civilians",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:54:28.671000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "148 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69069167e1e2a222bd7762f2",
          "name": "Palantir - Spyware",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-11-01T23:01:59.339000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "privacynotacrime",
            "id": "349346",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 57,
          "modified_text": "148 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68bc597c34358af14891a484",
          "name": "A State: Government Financial Department affected by malware and threat actors",
          "description": "A State Governmental Financial Department contacted. Lightly researched link below.\nFinal URL: https://www.palantir.com/blocked/?blocker=Envoy&ip=35.243.23.172&vpcEndpoint=&errorInstanceId=b8ae0a73-8c2d-4d81-a6ea-ee53943e9485&targetDomain=millet-usgc-1.palantirfedstart. |  403 Code - contacted |",
          "modified": "2025-10-06T15:03:41.536000",
          "created": "2025-09-06T15:55:40.069000",
          "tags": [
            "status",
            "united",
            "unknown ns",
            "search",
            "certificate",
            "passive dns",
            "urls",
            "record value",
            "emails",
            "date",
            "title",
            "present jul",
            "script urls",
            "security",
            "a domains",
            "script domains",
            "read",
            "meta",
            "443 ma86400",
            "next associated",
            "files show",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "gmt server",
            "extraction f",
            "enter so",
            "type",
            "u extraction",
            "data upload",
            "extraction",
            "orbrop",
            "present aug",
            "present jun",
            "present oct",
            "entries",
            "present apr",
            "present nov",
            "gtmpsl84dj",
            "resolved ips",
            "c0002 wininet",
            "data",
            "datacrashpad",
            "edge",
            "url data",
            "accept",
            "gmt ifnonematch",
            "address port",
            "cname",
            "response",
            "nxdomain",
            "name n",
            "creation date",
            "domain add",
            "pulse pulses",
            "files",
            "ip address",
            "location united",
            "asn as13335",
            "whois registrar"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1785,
            "domain": 710,
            "hostname": 949,
            "FileHash-SHA256": 864,
            "email": 4,
            "CVE": 3,
            "FileHash-MD5": 27,
            "FileHash-SHA1": 27
          },
          "indicator_count": 4369,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "194 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d5d33d16ab7837e23bc01",
          "name": "howmanyofme.com  - Packed | Palantir",
          "description": "howmanyofme.com was a honeypot. The names listed are potentially monitored targets. One was verified target.||\nhttp://howmanyofme.com/search/?given=Tsara&sur=Brashears/\nhttp://ww2.howmanyofme.com/people/Carrie_Henn/\nhttp://ww2.howmanyofme.com/people/Rockmond_Dunbar/\nhttp://howmanyofme.com/people/John_Hurt/\nhttp://howmanyofme.com/people/Mary_Gross/\nhttp://howmanyofme.com/people/Kenneth_Tobey/\nhttp://ww2.howmanyofme.com/people/Royce_Clayton/\n\n\n#Palantir # #honeypot #howmanyofme",
          "modified": "2025-09-18T23:05:18.490000",
          "created": "2025-07-20T21:18:43.974000",
          "tags": [
            "united",
            "unknown ns",
            "a domains",
            "ip address",
            "search",
            "privacy service",
            "fbo registrant",
            "date",
            "entries",
            "how many",
            "destination",
            "port",
            "windows nt",
            "msie",
            "unknown",
            "et trojan",
            "poodle attack",
            "policy sslv3",
            "united kingdom",
            "suspicious",
            "copy",
            "virustotal",
            "malware",
            "write",
            "hostile",
            "next",
            "triton",
            "super node",
            "get reloaded",
            "x11 snf",
            "png image",
            "rgba",
            "post reloaded",
            "ascii text",
            "crlf line",
            "gnu message",
            "ms windows",
            "intel",
            "pe32",
            "host",
            "get babylon",
            "show",
            "babylon"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7185,
            "domain": 706,
            "hostname": 1906,
            "email": 5,
            "FileHash-SHA256": 3645,
            "FileHash-MD5": 330,
            "FileHash-SHA1": 135,
            "CVE": 1
          },
          "indicator_count": 13913,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "212 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d69cf392438bd5e8137df",
          "name": "Datacenter / Hosting / VPS | Sinkhole Shadow Server | Worm",
          "description": "*Worm:Win32/Gamarue.F\n[compromised_site_redirector_fromcharcode\nfromCharCode]\n[SC-A.SINKHOLE.SHADOWSERVER.ORG]\nDatacenter / Hosting / VPS\nReverse DNS:\n184-105-192-2.sinkhole.shadowserver.org |\nLocation:\nUnited States of America\nASN:\nAS6939 Hurricane Electric Llc | \n#bgp #sinkhole #abuse #outbound #inbound #network_nightmare #polymorphic #dropper #trojan #worm #downloader #spy \t\n [Suspicious \u2022 sonic4me.com \u2022 184.105.192.2]\n [Suspicious \u2022imageshells.com \u2022 184.105.192.2]",
          "modified": "2025-09-13T03:03:04.181000",
          "created": "2025-08-14T04:45:03.875000",
          "tags": [
            "url http",
            "showing",
            "entries",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "mitre att",
            "pattern match",
            "ck id",
            "show technique",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "date",
            "strings",
            "passive dns",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "domain",
            "address",
            "creation date",
            "name servers",
            "pulse submit",
            "url analysis",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "ck techniques",
            "lowfi",
            "united",
            "next associated",
            "ipv4",
            "files",
            "hosting",
            "present dec",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "no expiration",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "iocs",
            "enter source",
            "url or",
            "text drag",
            "drop or",
            "browse to",
            "next related",
            "domains show",
            "search",
            "dynamicloader",
            "medium",
            "high",
            "ff ff",
            "reg add",
            "skype",
            "regsz d",
            "fake",
            "show",
            "write c",
            "worm",
            "copy",
            "andromeda",
            "write",
            "june",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 505,
            "domain": 64,
            "hostname": 138,
            "FileHash-MD5": 153,
            "FileHash-SHA1": 184,
            "FileHash-SHA256": 383,
            "SSLCertFingerprint": 2,
            "email": 1
          },
          "indicator_count": 1430,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://unicef.se/assets/apple",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Quickstart"
          ],
          "malware_families": [
            "Win.trojan.vundo-7170412-0",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn",
            "Pws:win32/qqpass.fc",
            "Multiple malware attack",
            "Trojan:win32/zombie.a",
            "#lowfi:suspicioussectionname",
            "Multiple malware\u2019s , trojans and rats",
            "Win.malware.urelas-9863836-0",
            "Trojan:win32/neconyd.a"
          ],
          "industries": [
            "Government",
            "Technology"
          ],
          "unique_indicators": 36547
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/blendle.nl",
    "whois": "http://whois.domaintools.com/blendle.nl",
    "domain": "blendle.nl",
    "hostname": "static.blendle.nl"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "69a3c685d4b7c139ffe62930",
      "name": "Clone Pulse Reference",
      "description": "",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-03-01T04:54:29.384000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6906bd99cadbd4140014c6af",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 454,
        "hostname": 1404,
        "URL": 3557,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1,
        "CVE": 1
      },
      "indicator_count": 6754,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906bd99cadbd4140014c6af",
      "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
      "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
      "modified": "2025-12-02T01:05:30.331000",
      "created": "2025-11-02T02:10:33.546000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 449,
        "hostname": 1403,
        "URL": 3552,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1
      },
      "indicator_count": 6742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "138 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9a1ef2dd26ec62a3c298c",
      "name": "Listeners - Malicious Over the top espionage | Cyber Warfare?",
      "description": "Cyber attacks on targeted devices stored safely, separately, don\u2019t communicate with one another. PalantirFoundry.com shares IP addresses with Fastly. South African IP\u2019s and DGA domains bounce from US Denver , Co based IP and Domain addresses. Registrar Abuse: HTTP/2 404 content type: text/html content length: 2263 date: Wed 22 Oct 2025 22:32:18 GMT server: Envoy\n443 Certificate Subject: US\n443 Certificate Subject: Colorado\n443 Certificate Subject: Denver\n443 Certificate Subject: Palantir Technologies Inc.\n443 Certificate Subject: listeners.usw-19.palantirfoundry.com",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-10-23T03:33:03.315000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 180,
      "modified_text": "148 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9a6f4e35193c04401daaf",
      "name": "Emotet & VirTool Obsfuscator - Registrar abuse tracking civilians",
      "description": "",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-10-23T03:54:28.671000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": "68f9a1ef2dd26ec62a3c298c",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "148 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69069167e1e2a222bd7762f2",
      "name": "Palantir - Spyware",
      "description": "",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-11-01T23:01:59.339000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": "68f9a1ef2dd26ec62a3c298c",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "privacynotacrime",
        "id": "349346",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 57,
      "modified_text": "148 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68bc597c34358af14891a484",
      "name": "A State: Government Financial Department affected by malware and threat actors",
      "description": "A State Governmental Financial Department contacted. Lightly researched link below.\nFinal URL: https://www.palantir.com/blocked/?blocker=Envoy&ip=35.243.23.172&vpcEndpoint=&errorInstanceId=b8ae0a73-8c2d-4d81-a6ea-ee53943e9485&targetDomain=millet-usgc-1.palantirfedstart. |  403 Code - contacted |",
      "modified": "2025-10-06T15:03:41.536000",
      "created": "2025-09-06T15:55:40.069000",
      "tags": [
        "status",
        "united",
        "unknown ns",
        "search",
        "certificate",
        "passive dns",
        "urls",
        "record value",
        "emails",
        "date",
        "title",
        "present jul",
        "script urls",
        "security",
        "a domains",
        "script domains",
        "read",
        "meta",
        "443 ma86400",
        "next associated",
        "files show",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "gmt server",
        "extraction f",
        "enter so",
        "type",
        "u extraction",
        "data upload",
        "extraction",
        "orbrop",
        "present aug",
        "present jun",
        "present oct",
        "entries",
        "present apr",
        "present nov",
        "gtmpsl84dj",
        "resolved ips",
        "c0002 wininet",
        "data",
        "datacrashpad",
        "edge",
        "url data",
        "accept",
        "gmt ifnonematch",
        "address port",
        "cname",
        "response",
        "nxdomain",
        "name n",
        "creation date",
        "domain add",
        "pulse pulses",
        "files",
        "ip address",
        "location united",
        "asn as13335",
        "whois registrar"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1785,
        "domain": 710,
        "hostname": 949,
        "FileHash-SHA256": 864,
        "email": 4,
        "CVE": 3,
        "FileHash-MD5": 27,
        "FileHash-SHA1": 27
      },
      "indicator_count": 4369,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "194 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687d5d33d16ab7837e23bc01",
      "name": "howmanyofme.com  - Packed | Palantir",
      "description": "howmanyofme.com was a honeypot. The names listed are potentially monitored targets. One was verified target.||\nhttp://howmanyofme.com/search/?given=Tsara&sur=Brashears/\nhttp://ww2.howmanyofme.com/people/Carrie_Henn/\nhttp://ww2.howmanyofme.com/people/Rockmond_Dunbar/\nhttp://howmanyofme.com/people/John_Hurt/\nhttp://howmanyofme.com/people/Mary_Gross/\nhttp://howmanyofme.com/people/Kenneth_Tobey/\nhttp://ww2.howmanyofme.com/people/Royce_Clayton/\n\n\n#Palantir # #honeypot #howmanyofme",
      "modified": "2025-09-18T23:05:18.490000",
      "created": "2025-07-20T21:18:43.974000",
      "tags": [
        "united",
        "unknown ns",
        "a domains",
        "ip address",
        "search",
        "privacy service",
        "fbo registrant",
        "date",
        "entries",
        "how many",
        "destination",
        "port",
        "windows nt",
        "msie",
        "unknown",
        "et trojan",
        "poodle attack",
        "policy sslv3",
        "united kingdom",
        "suspicious",
        "copy",
        "virustotal",
        "malware",
        "write",
        "hostile",
        "next",
        "triton",
        "super node",
        "get reloaded",
        "x11 snf",
        "png image",
        "rgba",
        "post reloaded",
        "ascii text",
        "crlf line",
        "gnu message",
        "ms windows",
        "intel",
        "pe32",
        "host",
        "get babylon",
        "show",
        "babylon"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7185,
        "domain": 706,
        "hostname": 1906,
        "email": 5,
        "FileHash-SHA256": 3645,
        "FileHash-MD5": 330,
        "FileHash-SHA1": 135,
        "CVE": 1
      },
      "indicator_count": 13913,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "212 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d69cf392438bd5e8137df",
      "name": "Datacenter / Hosting / VPS | Sinkhole Shadow Server | Worm",
      "description": "*Worm:Win32/Gamarue.F\n[compromised_site_redirector_fromcharcode\nfromCharCode]\n[SC-A.SINKHOLE.SHADOWSERVER.ORG]\nDatacenter / Hosting / VPS\nReverse DNS:\n184-105-192-2.sinkhole.shadowserver.org |\nLocation:\nUnited States of America\nASN:\nAS6939 Hurricane Electric Llc | \n#bgp #sinkhole #abuse #outbound #inbound #network_nightmare #polymorphic #dropper #trojan #worm #downloader #spy \t\n [Suspicious \u2022 sonic4me.com \u2022 184.105.192.2]\n [Suspicious \u2022imageshells.com \u2022 184.105.192.2]",
      "modified": "2025-09-13T03:03:04.181000",
      "created": "2025-08-14T04:45:03.875000",
      "tags": [
        "url http",
        "showing",
        "entries",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "mitre att",
        "pattern match",
        "ck id",
        "show technique",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "iframe",
        "click",
        "date",
        "strings",
        "passive dns",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "domain",
        "address",
        "creation date",
        "name servers",
        "pulse submit",
        "url analysis",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "ck techniques",
        "lowfi",
        "united",
        "next associated",
        "ipv4",
        "files",
        "hosting",
        "present dec",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "no expiration",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "iocs",
        "enter source",
        "url or",
        "text drag",
        "drop or",
        "browse to",
        "next related",
        "domains show",
        "search",
        "dynamicloader",
        "medium",
        "high",
        "ff ff",
        "reg add",
        "skype",
        "regsz d",
        "fake",
        "show",
        "write c",
        "worm",
        "copy",
        "andromeda",
        "write",
        "june",
        "malware"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 505,
        "domain": 64,
        "hostname": 138,
        "FileHash-MD5": 153,
        "FileHash-SHA1": 184,
        "FileHash-SHA256": 383,
        "SSLCertFingerprint": 2,
        "email": 1
      },
      "indicator_count": 1430,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://static.blendle.nl/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://static.blendle.nl/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591852.790148
}