{
  "type": "URL",
  "indicator": "https://static.searchstax.com/js",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://static.searchstax.com/js",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2896602122,
      "indicator": "https://static.searchstax.com/js",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 16,
      "pulses": [
        {
          "id": "6665d55d941729c5f283b3f7",
          "name": "S0094-Remote Access - Assurance [a Prudential company]",
          "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023. health insurance agents Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
          "modified": "2024-07-09T15:02:04.111000",
          "created": "2024-06-09T16:16:29.634000",
          "tags": [
            "falcon sandbox",
            "sha256",
            "sha1",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "ascii text",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "historical ssl",
            "referrer",
            "httponly",
            "path",
            "secure",
            "maxage31557600",
            "expiresmon",
            "samesitenone",
            "expireswed",
            "etag w",
            "setcookie dids",
            "maxage864000",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "html document",
            "history",
            "utc names",
            "html info",
            "title assurance",
            "meta tags",
            "script tags",
            "anchor hrefs",
            "code",
            "requestid",
            "hostid",
            "xml file",
            "accessdenied",
            "message",
            "signature",
            "expires",
            "awsaccesskeyid",
            "log id",
            "gmtn",
            "passive dns",
            "urls",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "tls web",
            "full name",
            "self",
            "false",
            "united",
            "as8075",
            "unknown",
            "gmt server",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "aaaa",
            "meta",
            "link",
            "search",
            "creation date",
            "wheels up",
            "moved",
            "homepage",
            "servers",
            "service",
            "name servers",
            "hostname",
            "next",
            "japan unknown",
            "as2510 fujitsu",
            "status",
            "page",
            "ltd dba",
            "com laude",
            "record value",
            "ireland",
            "germany",
            "australia",
            "as44786 adobe",
            "whitelisted",
            "win32",
            "present may",
            "trojan",
            "karaganye",
            "regsetvalueexa",
            "regdword",
            "default",
            "show",
            "presto",
            "regbinary",
            "medium",
            "create c",
            "query",
            "double",
            "malware",
            "copy",
            "karagany",
            "write",
            "showing",
            "as35908 krypt",
            "as45102 alibaba",
            "hong kong",
            "data service",
            "script script",
            "div div",
            "title",
            "entries",
            "files",
            "japan asn",
            "dns resolutions",
            "memory pattern",
            "ip traffic",
            "domains",
            "urls https",
            "files c",
            "filesgoogle c",
            "written c",
            "extensions",
            "as20446",
            "as14061",
            "emails",
            "threat roundup",
            "bashlite",
            "jupyter rising",
            "vmware",
            "security blog",
            "april",
            "september",
            "december",
            "january",
            "enemybot",
            "core"
          ],
          "references": [
            "Assurance",
            "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
            "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
            "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
            "Domains Contacted: simplesausages.cx.cc adobe.com",
            "https://test2.ditproducts.com/dat/wannacry1.html",
            "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "CVE-2023-22518 | CVE-2023-4966"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "target": null
            },
            {
              "id": "Win32:Karagany-D\\ [Trj]",
              "display_name": "Win32:Karagany-D\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Xtoober-650",
              "display_name": "Win.Trojan.Xtoober-650",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage.SS",
              "display_name": "Trojan:Win32/Startpage.SS",
              "target": "/malware/Trojan:Win32/Startpage.SS"
            },
            {
              "id": "Win.Packed.Pincav-7537597-0",
              "display_name": "Win.Packed.Pincav-7537597-0",
              "target": null
            },
            {
              "id": "Trojan.Karagany - S0094",
              "display_name": "Trojan.Karagany - S0094",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1574.002",
              "name": "DLL Side-Loading",
              "display_name": "T1574.002 - DLL Side-Loading"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Finance - Insurance Sector"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2950,
            "FileHash-MD5": 193,
            "FileHash-SHA1": 171,
            "FileHash-SHA256": 1885,
            "URL": 8907,
            "domain": 2945,
            "SSLCertFingerprint": 2,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 17066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "649 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6665d9ae1b06b560698b2a70",
          "name": "Assurance [a Prudential company] S0094-Remote Access",
          "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023.    Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly/Crouching Yeti and more. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
          "modified": "2024-07-09T15:02:04.111000",
          "created": "2024-06-09T16:34:54.161000",
          "tags": [
            "falcon sandbox",
            "sha256",
            "sha1",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "ascii text",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "historical ssl",
            "referrer",
            "httponly",
            "path",
            "secure",
            "maxage31557600",
            "expiresmon",
            "samesitenone",
            "expireswed",
            "etag w",
            "setcookie dids",
            "maxage864000",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "html document",
            "history",
            "utc names",
            "html info",
            "title assurance",
            "meta tags",
            "script tags",
            "anchor hrefs",
            "code",
            "requestid",
            "hostid",
            "xml file",
            "accessdenied",
            "message",
            "signature",
            "expires",
            "awsaccesskeyid",
            "log id",
            "gmtn",
            "passive dns",
            "urls",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "tls web",
            "full name",
            "self",
            "false",
            "united",
            "as8075",
            "unknown",
            "gmt server",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "aaaa",
            "meta",
            "link",
            "search",
            "creation date",
            "wheels up",
            "moved",
            "homepage",
            "servers",
            "service",
            "name servers",
            "hostname",
            "next",
            "japan unknown",
            "as2510 fujitsu",
            "status",
            "page",
            "ltd dba",
            "com laude",
            "record value",
            "ireland",
            "germany",
            "australia",
            "as44786 adobe",
            "whitelisted",
            "win32",
            "present may",
            "trojan",
            "karaganye",
            "regsetvalueexa",
            "regdword",
            "default",
            "show",
            "presto",
            "regbinary",
            "medium",
            "create c",
            "query",
            "double",
            "malware",
            "copy",
            "karagany",
            "write",
            "showing",
            "as35908 krypt",
            "as45102 alibaba",
            "hong kong",
            "data service",
            "script script",
            "div div",
            "title",
            "entries",
            "files",
            "japan asn",
            "dns resolutions",
            "memory pattern",
            "ip traffic",
            "domains",
            "urls https",
            "files c",
            "filesgoogle c",
            "written c",
            "extensions",
            "as20446",
            "as14061",
            "emails",
            "threat roundup",
            "bashlite",
            "jupyter rising",
            "vmware",
            "security blog",
            "april",
            "september",
            "december",
            "january",
            "enemybot",
            "core"
          ],
          "references": [
            "Assurance",
            "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
            "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
            "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
            "Domains Contacted: simplesausages.cx.cc adobe.com",
            "https://test2.ditproducts.com/dat/wannacry1.html",
            "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "CVE-2023-22518 | CVE-2023-4966"
          ],
          "public": 1,
          "adversary": "Berserk Bear (also known as BROMINE, Crouching Yeti, Dragonfly,",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "target": null
            },
            {
              "id": "Win32:Karagany-D\\ [Trj]",
              "display_name": "Win32:Karagany-D\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Xtoober-650",
              "display_name": "Win.Trojan.Xtoober-650",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage.SS",
              "display_name": "Trojan:Win32/Startpage.SS",
              "target": "/malware/Trojan:Win32/Startpage.SS"
            },
            {
              "id": "Win.Packed.Pincav-7537597-0",
              "display_name": "Win.Packed.Pincav-7537597-0",
              "target": null
            },
            {
              "id": "Trojan.Karagany - S0094",
              "display_name": "Trojan.Karagany - S0094",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1574.002",
              "name": "DLL Side-Loading",
              "display_name": "T1574.002 - DLL Side-Loading"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Finance - Insurance Sector"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2950,
            "FileHash-MD5": 193,
            "FileHash-SHA1": 171,
            "FileHash-SHA256": 1885,
            "URL": 8907,
            "domain": 2945,
            "SSLCertFingerprint": 2,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 17066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "649 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c01dca4e6c505e4fca0",
          "name": "Hostgator - whitelisted",
          "description": "",
          "modified": "2023-12-06T14:58:09.135000",
          "created": "2023-12-06T14:58:09.135000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 692,
            "hostname": 1339,
            "domain": 1260,
            "URL": 4622,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570897ecb6cec4777625431",
          "name": "www.routerlogin.net",
          "description": "",
          "modified": "2023-12-06T14:47:26.604000",
          "created": "2023-12-06T14:47:26.604000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1532,
            "domain": 2033,
            "URL": 11153,
            "hostname": 2800,
            "FileHash-SHA1": 5,
            "email": 3,
            "FileHash-MD5": 6
          },
          "indicator_count": 17532,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657081c803964e671c853056",
          "name": "clarity elections.com",
          "description": "",
          "modified": "2023-12-06T14:14:32.101000",
          "created": "2023-12-06T14:14:32.101000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 819,
            "FileHash-SHA256": 1516,
            "hostname": 1515,
            "URL": 5858
          },
          "indicator_count": 9708,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570800373899fd03e2e49db",
          "name": "Democrats.org",
          "description": "",
          "modified": "2023-12-06T14:06:59.250000",
          "created": "2023-12-06T14:06:59.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3114,
            "domain": 3501,
            "hostname": 3860,
            "URL": 17938,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f519ef27fa72eb62598",
          "name": "CambridgeAnalytica.org",
          "description": "",
          "modified": "2023-12-06T14:04:01.301000",
          "created": "2023-12-06T14:04:01.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 335,
            "URL": 13379,
            "hostname": 2501,
            "domain": 1501,
            "FileHash-SHA1": 15
          },
          "indicator_count": 17731,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707ec3c760eea3873db672",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2023-12-06T14:01:39.582000",
          "created": "2023-12-06T14:01:39.582000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 1950,
            "hostname": 1620,
            "domain": 900,
            "URL": 6563
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707d8251e635c843c1f5b8",
          "name": "Asurion.com",
          "description": "",
          "modified": "2023-12-06T13:56:18.534000",
          "created": "2023-12-06T13:56:18.534000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 805,
            "hostname": 2031,
            "URL": 7728,
            "domain": 1064,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 4,
            "email": 2
          },
          "indicator_count": 11638,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f112112bb456382bee7c9",
          "name": "Hostgator - whitelisted",
          "description": "Firing Rule, IRF.util.com, is set to go live on the internet after it was triggered by a new rule, but if it is not already in place, it will not load.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T19:44:33.964000",
          "tags": [
            "webkitkeyframes",
            "helvetica neue",
            "helvetica",
            "arial",
            "45deg",
            "100vw",
            "typetext",
            "copyright",
            "closure library",
            "affiliatepage",
            "tospage",
            "banner",
            "iab2",
            "acceptall",
            "rejectall",
            "genven",
            "expecting iab",
            "iab tcf",
            "oldcctid",
            "newdomainid",
            "unknown",
            "checkbox",
            "date",
            "component",
            "apptree",
            "hnull",
            "fcee",
            "typeof t",
            "typeerror",
            "qss7",
            "error",
            "promise",
            "hfunction",
            "typeof e",
            "rfc3986",
            "string",
            "array",
            "rfc1738",
            "object",
            "sr1t",
            "typeof symbol",
            "animation",
            "null",
            "rnull",
            "forwardref",
            "typeof n",
            "nullt",
            "cxlc",
            "dptw",
            "dtha",
            "gdzw",
            "gurp",
            "w0b4",
            "kjy9",
            "uigm",
            "ve6h",
            "event",
            "currency",
            "currencysymbol",
            "ucvw",
            "ofunction",
            "ocsf",
            "xfunction",
            "urlsearchparams",
            "open",
            "symbol",
            "nfunction",
            "lfunction",
            "ufunction",
            "typeof window",
            "typeof self",
            "hj",
            "09af",
            "regexp",
            "irmstevent",
            "bad expr",
            "hotjar",
            "email",
            "telefon",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "n color",
            "number",
            "customevent",
            "n strictly",
            "hostn host",
            "button",
            "cookie tracking",
            "close",
            "campaign",
            "decision",
            "action",
            "page",
            "controller",
            "must",
            "visitor",
            "groupstart",
            "info",
            "obsolete",
            "false",
            "reduceright",
            "portland",
            "trackevent",
            "query",
            "u003cu003e",
            "trackpageview",
            "code",
            "path",
            "click",
            "derek",
            "void",
            "gsxr89skrrs",
            "r300",
            "uint8array",
            "typeof d",
            "caca",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "function",
            "service",
            "phonenumber",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "which",
            "thank",
            "hostgator",
            "poll",
            "primary intent",
            "iwe didn",
            "f39c11",
            "team",
            "script",
            "array int8array",
            "caregexp",
            "legacy",
            "irfcd",
            "error setting",
            "irgbd",
            "outer",
            "dynamic tag",
            "variable",
            "rule",
            "expr",
            "inline script"
          ],
          "references": [
            "xfe-URL-hostgator.com-stix2-2.1-export.json",
            "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
            "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
            "https://bat.bing.com/bat.js",
            "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
            "https://cdn3.optimizely.com/js/geo4.js",
            "https://cdn.optimizely.com/js/13477600374.js",
            "https://bat.bing.com/p/action/5797759.js",
            "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
            "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
            "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
            "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
            "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
            "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
            "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
            "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1339,
            "URL": 4622,
            "domain": 1260,
            "FileHash-SHA256": 692,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6235e08a628e6c19d898f05c",
          "name": "www.routerlogin.net",
          "description": "",
          "modified": "2022-04-18T00:07:16.048000",
          "created": "2022-03-19T13:54:18.436000",
          "tags": [
            "code",
            "server",
            "san jose",
            "date",
            "key identifier",
            "algorithm",
            "email",
            "registrar url",
            "registry domain",
            "registry expiry",
            "win32 exe",
            "win32 dll",
            "dos exe",
            "android",
            "librouter",
            "network capture",
            "thinclient",
            "setup",
            "type name",
            "referring",
            "technology",
            "dns replication",
            "security",
            "registrar abuse",
            "comodo valkyrie",
            "verdict mobile",
            "rank value",
            "ingestion time",
            "cisco umbrella",
            "dns records",
            "record type",
            "nreum",
            "httponly",
            "netgear router",
            "submission",
            "expirestue",
            "path",
            "netgear twitter",
            "router login",
            "nr agent",
            "Ransomware",
            "WannaCry"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Ransomware.WannaCry-9856297-0",
              "display_name": "Win.Ransomware.WannaCry-9856297-0",
              "target": null
            },
            {
              "id": "Win32:Dracur-D\\ [Cryp]",
              "display_name": "Win32:Dracur-D\\ [Cryp]",
              "target": null
            },
            {
              "id": "Worm:Win32/Krol.A",
              "display_name": "Worm:Win32/Krol.A",
              "target": "/malware/Worm:Win32/Krol.A"
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1532,
            "domain": 2033,
            "hostname": 2800,
            "URL": 11153,
            "email": 3,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 5
          },
          "indicator_count": 17532,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 414,
          "modified_text": "1462 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "622faed53b9d5fe0c1331f1a",
          "name": "clarity elections.com",
          "description": "",
          "modified": "2022-04-13T00:01:48.292000",
          "created": "2022-03-14T21:08:37.571000",
          "tags": [
            "whois",
            "ssl certificate",
            "whois record",
            "arkeistealer",
            "prometei",
            "xanthe",
            "evilgrab",
            "plugx",
            "sunburst",
            "trochilus rat",
            "mirai",
            "test"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5858,
            "hostname": 1515,
            "domain": 819,
            "FileHash-SHA256": 1516
          },
          "indicator_count": 9708,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1467 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220c81aaf6fddde0116569a",
          "name": "Democrats.org",
          "description": "",
          "modified": "2022-04-02T00:04:50.405000",
          "created": "2022-03-03T13:52:26.328000",
          "tags": [
            "date",
            "dns replication"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 17938,
            "hostname": 3860,
            "domain": 3501,
            "FileHash-SHA256": 3114,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "621927dd57ee9ed86aeb9cb4",
          "name": "CambridgeAnalytica.org",
          "description": "",
          "modified": "2022-03-27T00:00:39.057000",
          "created": "2022-02-25T19:02:53.023000",
          "tags": [
            "win32 exe",
            "scott hanselman",
            "win32 dll",
            "llc creation",
            "date",
            "passive dns",
            "subdomains",
            "detections type",
            "name",
            "rich text",
            "format",
            "music",
            "first"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13379,
            "hostname": 2501,
            "domain": 1501,
            "FileHash-SHA256": 335,
            "FileHash-SHA1": 15
          },
          "indicator_count": 17731,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1484 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6213f8adc8cfe3f681957ed1",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2022-03-23T00:02:04.887000",
          "created": "2022-02-21T20:40:13.490000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1620,
            "URL": 6563,
            "FileHash-SHA256": 1950,
            "domain": 900,
            "CVE": 1
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 409,
          "modified_text": "1488 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "61f2cadaf1967e1400a2273a",
          "name": "Asurion.com",
          "description": "",
          "modified": "2022-02-26T00:02:44.767000",
          "created": "2022-01-27T16:39:54.550000",
          "tags": [
            "technology",
            "date",
            "security",
            "csc corporate",
            "domains",
            "code",
            "llc registrar",
            "iana id",
            "server",
            "registrar abuse",
            "registrant",
            "tech email",
            "admin country",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "v3 serial",
            "number",
            "issuer",
            "cus cnentrust",
            "l1k oentrust",
            "entrust",
            "validity",
            "info",
            "first",
            "whois record",
            "ssl certificate"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 805,
            "URL": 7728,
            "hostname": 2031,
            "domain": 1064,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 4,
            "email": 2
          },
          "indicator_count": 11638,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1513 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
        "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
        "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
        "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://bat.bing.com/bat.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
        "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
        "https://test2.ditproducts.com/dat/wannacry1.html",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
        "Domains Contacted: simplesausages.cx.cc adobe.com",
        "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://cdn.optimizely.com/js/13477600374.js",
        "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
        "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
        "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
        "https://bat.bing.com/p/action/5797759.js",
        "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
        "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
        "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
        "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
        "Assurance",
        "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
        "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
        "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
        "xfe-URL-hostgator.com-stix2-2.1-export.json",
        "https://cdn3.optimizely.com/js/geo4.js",
        "CVE-2023-22518 | CVE-2023-4966",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Berserk Bear (also known as BROMINE, Crouching Yeti, Dragonfly,"
          ],
          "malware_families": [
            "Trojan:win32/startpage.ss",
            "Trojan.karagany - s0094",
            "Win.trojan.xtoober-650",
            "Win.packed.pincav-7537597-0",
            "Win.ransomware.wannacry-9856297-0",
            "Win32:dracur-d\\ [cryp]",
            "Worm:win32/krol.a",
            "Alf:jasyp:trojandownloader:win32/karagany!atmn",
            "Reduceright",
            "Win32:karagany-d\\ [trj]",
            "Hj"
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government",
            "Healthcare",
            "Finance - insurance sector"
          ],
          "unique_indicators": 104700
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/searchstax.com",
    "whois": "http://whois.domaintools.com/searchstax.com",
    "domain": "searchstax.com",
    "hostname": "static.searchstax.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 16,
  "pulses": [
    {
      "id": "6665d55d941729c5f283b3f7",
      "name": "S0094-Remote Access - Assurance [a Prudential company]",
      "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023. health insurance agents Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
      "modified": "2024-07-09T15:02:04.111000",
      "created": "2024-06-09T16:16:29.634000",
      "tags": [
        "falcon sandbox",
        "sha256",
        "sha1",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "pattern match",
        "ascii text",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "click",
        "date",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "historical ssl",
        "referrer",
        "httponly",
        "path",
        "secure",
        "maxage31557600",
        "expiresmon",
        "samesitenone",
        "expireswed",
        "etag w",
        "setcookie dids",
        "maxage864000",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "html document",
        "history",
        "utc names",
        "html info",
        "title assurance",
        "meta tags",
        "script tags",
        "anchor hrefs",
        "code",
        "requestid",
        "hostid",
        "xml file",
        "accessdenied",
        "message",
        "signature",
        "expires",
        "awsaccesskeyid",
        "log id",
        "gmtn",
        "passive dns",
        "urls",
        "digicert global",
        "g2 tls",
        "rsa sha256",
        "tls web",
        "full name",
        "self",
        "false",
        "united",
        "as8075",
        "unknown",
        "gmt server",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "url https",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "aaaa",
        "meta",
        "link",
        "search",
        "creation date",
        "wheels up",
        "moved",
        "homepage",
        "servers",
        "service",
        "name servers",
        "hostname",
        "next",
        "japan unknown",
        "as2510 fujitsu",
        "status",
        "page",
        "ltd dba",
        "com laude",
        "record value",
        "ireland",
        "germany",
        "australia",
        "as44786 adobe",
        "whitelisted",
        "win32",
        "present may",
        "trojan",
        "karaganye",
        "regsetvalueexa",
        "regdword",
        "default",
        "show",
        "presto",
        "regbinary",
        "medium",
        "create c",
        "query",
        "double",
        "malware",
        "copy",
        "karagany",
        "write",
        "showing",
        "as35908 krypt",
        "as45102 alibaba",
        "hong kong",
        "data service",
        "script script",
        "div div",
        "title",
        "entries",
        "files",
        "japan asn",
        "dns resolutions",
        "memory pattern",
        "ip traffic",
        "domains",
        "urls https",
        "files c",
        "filesgoogle c",
        "written c",
        "extensions",
        "as20446",
        "as14061",
        "emails",
        "threat roundup",
        "bashlite",
        "jupyter rising",
        "vmware",
        "security blog",
        "april",
        "september",
        "december",
        "january",
        "enemybot",
        "core"
      ],
      "references": [
        "Assurance",
        "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
        "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
        "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
        "Domains Contacted: simplesausages.cx.cc adobe.com",
        "https://test2.ditproducts.com/dat/wannacry1.html",
        "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "CVE-2023-22518 | CVE-2023-4966"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
          "target": null
        },
        {
          "id": "Win32:Karagany-D\\ [Trj]",
          "display_name": "Win32:Karagany-D\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Xtoober-650",
          "display_name": "Win.Trojan.Xtoober-650",
          "target": null
        },
        {
          "id": "Trojan:Win32/Startpage.SS",
          "display_name": "Trojan:Win32/Startpage.SS",
          "target": "/malware/Trojan:Win32/Startpage.SS"
        },
        {
          "id": "Win.Packed.Pincav-7537597-0",
          "display_name": "Win.Packed.Pincav-7537597-0",
          "target": null
        },
        {
          "id": "Trojan.Karagany - S0094",
          "display_name": "Trojan.Karagany - S0094",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1574.002",
          "name": "DLL Side-Loading",
          "display_name": "T1574.002 - DLL Side-Loading"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology",
        "Telecommunications",
        "Finance - Insurance Sector"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2950,
        "FileHash-MD5": 193,
        "FileHash-SHA1": 171,
        "FileHash-SHA256": 1885,
        "URL": 8907,
        "domain": 2945,
        "SSLCertFingerprint": 2,
        "email": 11,
        "CVE": 2
      },
      "indicator_count": 17066,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "649 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6665d9ae1b06b560698b2a70",
      "name": "Assurance [a Prudential company] S0094-Remote Access",
      "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023.    Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly/Crouching Yeti and more. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
      "modified": "2024-07-09T15:02:04.111000",
      "created": "2024-06-09T16:34:54.161000",
      "tags": [
        "falcon sandbox",
        "sha256",
        "sha1",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "pattern match",
        "ascii text",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "click",
        "date",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "historical ssl",
        "referrer",
        "httponly",
        "path",
        "secure",
        "maxage31557600",
        "expiresmon",
        "samesitenone",
        "expireswed",
        "etag w",
        "setcookie dids",
        "maxage864000",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "html document",
        "history",
        "utc names",
        "html info",
        "title assurance",
        "meta tags",
        "script tags",
        "anchor hrefs",
        "code",
        "requestid",
        "hostid",
        "xml file",
        "accessdenied",
        "message",
        "signature",
        "expires",
        "awsaccesskeyid",
        "log id",
        "gmtn",
        "passive dns",
        "urls",
        "digicert global",
        "g2 tls",
        "rsa sha256",
        "tls web",
        "full name",
        "self",
        "false",
        "united",
        "as8075",
        "unknown",
        "gmt server",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "url https",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "aaaa",
        "meta",
        "link",
        "search",
        "creation date",
        "wheels up",
        "moved",
        "homepage",
        "servers",
        "service",
        "name servers",
        "hostname",
        "next",
        "japan unknown",
        "as2510 fujitsu",
        "status",
        "page",
        "ltd dba",
        "com laude",
        "record value",
        "ireland",
        "germany",
        "australia",
        "as44786 adobe",
        "whitelisted",
        "win32",
        "present may",
        "trojan",
        "karaganye",
        "regsetvalueexa",
        "regdword",
        "default",
        "show",
        "presto",
        "regbinary",
        "medium",
        "create c",
        "query",
        "double",
        "malware",
        "copy",
        "karagany",
        "write",
        "showing",
        "as35908 krypt",
        "as45102 alibaba",
        "hong kong",
        "data service",
        "script script",
        "div div",
        "title",
        "entries",
        "files",
        "japan asn",
        "dns resolutions",
        "memory pattern",
        "ip traffic",
        "domains",
        "urls https",
        "files c",
        "filesgoogle c",
        "written c",
        "extensions",
        "as20446",
        "as14061",
        "emails",
        "threat roundup",
        "bashlite",
        "jupyter rising",
        "vmware",
        "security blog",
        "april",
        "september",
        "december",
        "january",
        "enemybot",
        "core"
      ],
      "references": [
        "Assurance",
        "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
        "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
        "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
        "Domains Contacted: simplesausages.cx.cc adobe.com",
        "https://test2.ditproducts.com/dat/wannacry1.html",
        "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "CVE-2023-22518 | CVE-2023-4966"
      ],
      "public": 1,
      "adversary": "Berserk Bear (also known as BROMINE, Crouching Yeti, Dragonfly,",
      "targeted_countries": [
        "United States of America",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
          "target": null
        },
        {
          "id": "Win32:Karagany-D\\ [Trj]",
          "display_name": "Win32:Karagany-D\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Xtoober-650",
          "display_name": "Win.Trojan.Xtoober-650",
          "target": null
        },
        {
          "id": "Trojan:Win32/Startpage.SS",
          "display_name": "Trojan:Win32/Startpage.SS",
          "target": "/malware/Trojan:Win32/Startpage.SS"
        },
        {
          "id": "Win.Packed.Pincav-7537597-0",
          "display_name": "Win.Packed.Pincav-7537597-0",
          "target": null
        },
        {
          "id": "Trojan.Karagany - S0094",
          "display_name": "Trojan.Karagany - S0094",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1574.002",
          "name": "DLL Side-Loading",
          "display_name": "T1574.002 - DLL Side-Loading"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology",
        "Telecommunications",
        "Finance - Insurance Sector"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2950,
        "FileHash-MD5": 193,
        "FileHash-SHA1": 171,
        "FileHash-SHA256": 1885,
        "URL": 8907,
        "domain": 2945,
        "SSLCertFingerprint": 2,
        "email": 11,
        "CVE": 2
      },
      "indicator_count": 17066,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "649 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c01dca4e6c505e4fca0",
      "name": "Hostgator - whitelisted",
      "description": "",
      "modified": "2023-12-06T14:58:09.135000",
      "created": "2023-12-06T14:58:09.135000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 692,
        "hostname": 1339,
        "domain": 1260,
        "URL": 4622,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 1
      },
      "indicator_count": 7917,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570897ecb6cec4777625431",
      "name": "www.routerlogin.net",
      "description": "",
      "modified": "2023-12-06T14:47:26.604000",
      "created": "2023-12-06T14:47:26.604000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1532,
        "domain": 2033,
        "URL": 11153,
        "hostname": 2800,
        "FileHash-SHA1": 5,
        "email": 3,
        "FileHash-MD5": 6
      },
      "indicator_count": 17532,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657081c803964e671c853056",
      "name": "clarity elections.com",
      "description": "",
      "modified": "2023-12-06T14:14:32.101000",
      "created": "2023-12-06T14:14:32.101000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 819,
        "FileHash-SHA256": 1516,
        "hostname": 1515,
        "URL": 5858
      },
      "indicator_count": 9708,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570800373899fd03e2e49db",
      "name": "Democrats.org",
      "description": "",
      "modified": "2023-12-06T14:06:59.250000",
      "created": "2023-12-06T14:06:59.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3114,
        "domain": 3501,
        "hostname": 3860,
        "URL": 17938,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707f519ef27fa72eb62598",
      "name": "CambridgeAnalytica.org",
      "description": "",
      "modified": "2023-12-06T14:04:01.301000",
      "created": "2023-12-06T14:04:01.301000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 335,
        "URL": 13379,
        "hostname": 2501,
        "domain": 1501,
        "FileHash-SHA1": 15
      },
      "indicator_count": 17731,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707ec3c760eea3873db672",
      "name": "BernieSanders.com (Pt.3)",
      "description": "",
      "modified": "2023-12-06T14:01:39.582000",
      "created": "2023-12-06T14:01:39.582000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 1950,
        "hostname": 1620,
        "domain": 900,
        "URL": 6563
      },
      "indicator_count": 11034,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707d8251e635c843c1f5b8",
      "name": "Asurion.com",
      "description": "",
      "modified": "2023-12-06T13:56:18.534000",
      "created": "2023-12-06T13:56:18.534000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 805,
        "hostname": 2031,
        "URL": 7728,
        "domain": 1064,
        "FileHash-MD5": 4,
        "FileHash-SHA1": 4,
        "email": 2
      },
      "indicator_count": 11638,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "625f112112bb456382bee7c9",
      "name": "Hostgator - whitelisted",
      "description": "Firing Rule, IRF.util.com, is set to go live on the internet after it was triggered by a new rule, but if it is not already in place, it will not load.",
      "modified": "2022-05-19T00:00:49.028000",
      "created": "2022-04-19T19:44:33.964000",
      "tags": [
        "webkitkeyframes",
        "helvetica neue",
        "helvetica",
        "arial",
        "45deg",
        "100vw",
        "typetext",
        "copyright",
        "closure library",
        "affiliatepage",
        "tospage",
        "banner",
        "iab2",
        "acceptall",
        "rejectall",
        "genven",
        "expecting iab",
        "iab tcf",
        "oldcctid",
        "newdomainid",
        "unknown",
        "checkbox",
        "date",
        "component",
        "apptree",
        "hnull",
        "fcee",
        "typeof t",
        "typeerror",
        "qss7",
        "error",
        "promise",
        "hfunction",
        "typeof e",
        "rfc3986",
        "string",
        "array",
        "rfc1738",
        "object",
        "sr1t",
        "typeof symbol",
        "animation",
        "null",
        "rnull",
        "forwardref",
        "typeof n",
        "nullt",
        "cxlc",
        "dptw",
        "dtha",
        "gdzw",
        "gurp",
        "w0b4",
        "kjy9",
        "uigm",
        "ve6h",
        "event",
        "currency",
        "currencysymbol",
        "ucvw",
        "ofunction",
        "ocsf",
        "xfunction",
        "urlsearchparams",
        "open",
        "symbol",
        "nfunction",
        "lfunction",
        "ufunction",
        "typeof window",
        "typeof self",
        "hj",
        "09af",
        "regexp",
        "irmstevent",
        "bad expr",
        "hotjar",
        "email",
        "telefon",
        "survey",
        "meta",
        "cookie",
        "keypress",
        "trident",
        "live",
        "fullscreen",
        "generic",
        "window",
        "widget",
        "ciudad",
        "adore",
        "experiment",
        "mutation",
        "n color",
        "number",
        "customevent",
        "n strictly",
        "hostn host",
        "button",
        "cookie tracking",
        "close",
        "campaign",
        "decision",
        "action",
        "page",
        "controller",
        "must",
        "visitor",
        "groupstart",
        "info",
        "obsolete",
        "false",
        "reduceright",
        "portland",
        "trackevent",
        "query",
        "u003cu003e",
        "trackpageview",
        "code",
        "path",
        "click",
        "derek",
        "void",
        "gsxr89skrrs",
        "r300",
        "uint8array",
        "typeof d",
        "caca",
        "typeof",
        "facebook pixel",
        "pixel code",
        "iterator",
        "constantvalue",
        "globalvariable",
        "facebook",
        "boolean",
        "function",
        "service",
        "phonenumber",
        "ver0",
        "tag0",
        "extdata0",
        "ua ch",
        "invalid",
        "which",
        "thank",
        "hostgator",
        "poll",
        "primary intent",
        "iwe didn",
        "f39c11",
        "team",
        "script",
        "array int8array",
        "caregexp",
        "legacy",
        "irfcd",
        "error setting",
        "irgbd",
        "outer",
        "dynamic tag",
        "variable",
        "rule",
        "expr",
        "inline script"
      ],
      "references": [
        "xfe-URL-hostgator.com-stix2-2.1-export.json",
        "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
        "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
        "https://bat.bing.com/bat.js",
        "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
        "https://cdn3.optimizely.com/js/geo4.js",
        "https://cdn.optimizely.com/js/13477600374.js",
        "https://bat.bing.com/p/action/5797759.js",
        "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
        "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
        "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
        "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
        "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
        "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
        "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
        "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Tunisia"
      ],
      "malware_families": [
        {
          "id": "hj",
          "display_name": "hj",
          "target": null
        },
        {
          "id": "ReduceRight",
          "display_name": "ReduceRight",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1339,
        "URL": 4622,
        "domain": 1260,
        "FileHash-SHA256": 692,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 1
      },
      "indicator_count": 7917,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 71,
      "modified_text": "1431 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://static.searchstax.com/js",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://static.searchstax.com/js",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641929.545585
}