{
  "type": "URL",
  "indicator": "https://support.comaround.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://support.comaround.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3925605676,
      "indicator": "https://support.comaround.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "69d8a665177b8f64c7ce5fca",
          "name": "LibraryLoader \u2022 Samuel Tulach | Abuse of malicious sssets engineered by DevOp & Security Researcher",
          "description": "Samuel Tulach is involved in various projects related to government work, particularly in areas like DevSecOps and app modernization. \nOverview of Samuel Tulach's \"uploader.exe\"\nThe file \"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines. This classification indicates that the file poses a potential threat to users' systems.\nSecurity Engine Flags. Several security engines have flagged \"uploader.exe\" as malicious.\nSecureAge APEX\tMalicious\nSentinelOne\tMalicious\nImplications of Malicious Flags\nPotential Risks: Files flagged as malicious can lead to various security issues, including data theft, unauthorized access, or system damage.\nRecommended Actions: Users should avoid downloading or executing this file. If already downloaded, it is advisable to delete it and run a full system scan using reputable antivirus software.",
          "modified": "2026-04-10T07:27:33.587000",
          "created": "2026-04-10T07:27:33.587000",
          "tags": [
            "x vercel",
            "united",
            "america",
            "germany malware",
            "family",
            "ck ids",
            "packing",
            "tulach",
            "ocsp",
            "extraction",
            "data upload",
            "enter sc",
            "extra data",
            "include review",
            "exclude sugges",
            "find s",
            "failed",
            "typ no",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "pattern match",
            "mitre att",
            "ascii text",
            "span",
            "title",
            "meta",
            "path",
            "april",
            "hybrid",
            "general",
            "local",
            "encrypt",
            "click",
            "strings",
            "main",
            "footer",
            "pcsb",
            "naga",
            "magda",
            "no expiration",
            "url https",
            "domain",
            "github pages",
            "a domains",
            "passive dns",
            "mtb jan",
            "class",
            "sea x",
            "accept encoding",
            "trojanspy",
            "accept",
            "otx logo",
            "all ipv4",
            "urls",
            "files",
            "america flag",
            "space",
            "ck matrix",
            "handle",
            "winvmaddress",
            "cdecl crashpad",
            "null",
            "software",
            "comment",
            "entity",
            "internal",
            "blank",
            "magic",
            "infinity",
            "first",
            "valentine",
            "error",
            "webview",
            "front",
            "patched",
            "root",
            "tristate",
            "libraryloader",
            "packing t1045",
            "icmp traffic",
            "memcommit",
            "pe section",
            "low software",
            "pe resource",
            "filehash",
            "win32",
            "malware",
            "write",
            "backdoor",
            "present apr",
            "lowfi",
            "aaaa",
            "lowfijavazkm",
            "x.com",
            "dynamicloader",
            "crlf line",
            "unicode text",
            "utf8",
            "ee fc",
            "ff d5",
            "yara rule",
            "f0 ff",
            "eb e1",
            "unknown",
            "trojan",
            "zeppelin",
            "autorun",
            "united states",
            "china unknown",
            "div div",
            "ip address",
            "record value",
            "samuel tulach",
            "czechia unknown",
            "italy unknown",
            "gmt server",
            "all domain",
            "next associated",
            "reverse dns",
            "location czech",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "file type",
            "telfhash",
            "virustotal api",
            "vendor finding",
            "notes clamav",
            "files matching",
            "number",
            "t1045",
            "search",
            "directui",
            "element",
            "medium",
            "classinfobase",
            "value",
            "write c",
            "hwndhost",
            "sapeav12",
            "worm",
            "explorer",
            "insert",
            "movie",
            "mtb apr",
            "mtb mar",
            "trojandropper",
            "displayname",
            "windows",
            "high",
            "delete c",
            "tofsee",
            "stream",
            "push",
            "url http",
            "c mar",
            "virtool",
            "c jan",
            "c dec",
            "toolbar",
            "ransom",
            "article",
            "windows nt",
            "gmtvia",
            "html",
            "bad traffic",
            "et info",
            "tls handshake",
            "belgium",
            "present dec",
            "present feb",
            "intel",
            "elf upx",
            "medium risk",
            "info",
            "moved",
            "hostname add",
            "whois registrar",
            "media",
            "delphi",
            "guard",
            "code",
            "devsecops",
            "github",
            "github internet",
            "archive samuel",
            "tulach",
            "government work",
            "key areas",
            "devops process",
            "security engine",
            "flags",
            "apex malicious",
            "implications",
            "malicious flags",
            "potential risks",
            "name servers",
            "apple id",
            "script urls",
            "show process",
            "secure",
            "win64",
            "khtml",
            "gecko",
            "programfiles",
            "cookie",
            "comspec",
            "model",
            "june",
            "spawns",
            "id name",
            "malicious",
            "gui",
            "anti cheats",
            "game tech",
            "c++"
          ],
          "references": [
            "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
            "bleepingcomputer.com \u2022 CliffsNotes",
            "x.com - Malware Packed",
            "nr-data.net \u2022 www.youtube.com",
            "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses",
            "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
            "discord.com \u2022 discord.gg",
            "api.item.yixun.com",
            "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
            "Domains Contacted: fenbushijujuefuwu.com",
            "angryblackwomyn.com",
            "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
            "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
            "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
            "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
            "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
            "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
            "https://api.w.org/ \u2022 api.w.org",
            "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
            "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
            "developer.x.com \u2022 https://twitter.com/githubstatus",
            "https://twitter.com/juvlarN",
            "appleid.cdn-apple.com",
            "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
            "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
            "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
            "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
            "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
            "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
            "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
            "The next pulse will show Apple IoC\u2019s related to Tulach.cc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LibraryLoader",
              "display_name": "LibraryLoader",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
              "target": null
            },
            {
              "id": "Win.Packed.Botx-10021462-0",
              "display_name": "Win.Packed.Botx-10021462-0",
              "target": null
            },
            {
              "id": "Win.Malware.Cymt-10023133-0",
              "display_name": "Win.Malware.Cymt-10023133-0",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Nemucod",
              "display_name": "TrojanDownloader:Win32/Nemucod",
              "target": "/malware/TrojanDownloader:Win32/Nemucod"
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Generickdz-9937235-0",
              "display_name": "Win.Malware.Generickdz-9937235-0",
              "target": null
            },
            {
              "id": "Win.Malware.Razy-6979265-0",
              "display_name": "Win.Malware.Razy-6979265-0",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.DE",
              "display_name": "TrojanSpy:Win32/Nivdort.DE",
              "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
            },
            {
              "id": "SLF:Win32/Elenquay.A",
              "display_name": "SLF:Win32/Elenquay.A",
              "target": "/malware/SLF:Win32/Elenquay.A"
            },
            {
              "id": "Win.Dropper.QuasarRAT-10023124-0",
              "display_name": "Win.Dropper.QuasarRAT-10023124-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Zegost-9769410-0",
              "display_name": "Win.Trojan.Zegost-9769410-0",
              "target": null
            },
            {
              "id": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
              "display_name": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
              "target": null
            },
            {
              "id": "Win.Malware.Moonlight-9919383-0",
              "display_name": "Win.Malware.Moonlight-9919383-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "Backdoor:Win32/Tofsee.",
              "display_name": "Backdoor:Win32/Tofsee.",
              "target": "/malware/Backdoor:Win32/Tofsee."
            },
            {
              "id": "#LowfiJavaZKM",
              "display_name": "#LowfiJavaZKM",
              "target": null
            },
            {
              "id": "Win.Malware.Swisyn-7610494-0",
              "display_name": "Win.Malware.Swisyn-7610494-0",
              "target": null
            },
            {
              "id": "PWS:Win32/Ymacco.AA50",
              "display_name": "PWS:Win32/Ymacco.AA50",
              "target": "/malware/PWS:Win32/Ymacco.AA50"
            },
            {
              "id": "Win.Packed.Stealerc-10017074-0",
              "display_name": "Win.Packed.Stealerc-10017074-0",
              "target": null
            },
            {
              "id": "#Lowfi:Win32/AutoIt",
              "display_name": "#Lowfi:Win32/AutoIt",
              "target": "/malware/#Lowfi:Win32/AutoIt"
            },
            {
              "id": "Html.Trojan.Ascii212_44_64_202-1",
              "display_name": "Html.Trojan.Ascii212_44_64_202-1",
              "target": null
            },
            {
              "id": "ALFPER:HSTR:WizremURL.A1",
              "display_name": "ALFPER:HSTR:WizremURL.A1",
              "target": null
            },
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847893-0",
              "display_name": "Win.Malware.Midie-6847893-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop.V!MTB",
              "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
              "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Win.Malware.Aauto-9839281-0",
              "display_name": "Win.Malware.Aauto-9839281-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1371484",
              "display_name": "Win.Trojan.Agent-1371484",
              "target": null
            },
            {
              "id": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
              "display_name": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
              "display_name": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-9441505-0",
              "display_name": "Unix.Trojan.Mirai-9441505-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2710,
            "domain": 1227,
            "hostname": 1206,
            "FileHash-SHA256": 3867,
            "IPv4": 318,
            "FileHash-MD5": 593,
            "FileHash-SHA1": 459,
            "IPv6": 1,
            "SSLCertFingerprint": 19,
            "email": 20,
            "CVE": 1
          },
          "indicator_count": 10421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "9 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6875e98438889e51b3fdd18f",
          "name": "Critical \u2022 Schedule system process - Mirai | Foundry Overwatch",
          "description": "",
          "modified": "2025-08-14T05:04:16.839000",
          "created": "2025-07-15T05:39:16.652000",
          "tags": [
            "win32 exe",
            "country",
            "include review",
            "exclude",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "impact ob0008",
            "file system",
            "system oc0008",
            "match unknown",
            "adversaries",
            "match info",
            "info",
            "execution flow",
            "t1574 dll",
            "tries",
            "registry",
            "modify system",
            "process t1543",
            "unknown",
            "window",
            "ob0009 install",
            "ob0012 install",
            "insecure",
            "b0047 modify",
            "registry e1112",
            "hidden files",
            "registry run",
            "keys",
            "startup folder",
            "f0012 file",
            "critical",
            "united",
            "as15169",
            "delete c",
            "as16509",
            "show",
            "search",
            "intel",
            "ms windows",
            "entries",
            "medium",
            "worm",
            "copy",
            "write",
            "explorer",
            "malware",
            "next",
            "present jul",
            "status",
            "date",
            "ip address",
            "domain",
            "servers",
            "showing",
            "unknown ns",
            "related pulses",
            "pulses",
            "tags",
            "related tags",
            "more file",
            "type",
            "date april",
            "am size",
            "sha1 sha256",
            "as14618",
            "united kingdom",
            "as54113",
            "as15133 verizon",
            "top source",
            "top destination",
            "status domain",
            "ip whitelisted",
            "whitelisted",
            "tcp include",
            "source source",
            "oamazon",
            "cnamazon rsa",
            "odigicert inc",
            "sweden as20940",
            "as20940",
            "entries tls",
            "ip destination",
            "encrypt",
            "aaaa",
            "found",
            "certificate",
            "next associated",
            "urls show",
            "date checked",
            "error",
            "windows",
            "high",
            "yara detections",
            "installs",
            "checks",
            "filehash",
            "sha256 add",
            "themida",
            "data upload",
            "extraction",
            "md5 add",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "win32",
            "ddos",
            "passive dns",
            "activity",
            "checkin",
            "win64",
            "mtb jan",
            "lowfi",
            "trojan",
            "ransom",
            "trojandropper",
            "yara",
            "nsis",
            "nss bv",
            "su data",
            "windo alerts",
            "andariel",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "id deadhost",
            "connects",
            "andariel high",
            "richhash",
            "external",
            "virustotal api",
            "screenshots",
            "failed",
            "auurtonany data",
            "themida andarie",
            "present may",
            "japan unknown",
            "unknown cname",
            "domain add",
            "urls",
            "files",
            "http headers",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "wget command",
            "devices home",
            "execution",
            "foundry",
            "home networks",
            "mirai",
            "x.com",
            "porn",
            "monitored target",
            "d link",
            "targets"
          ],
          "references": [
            "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
            "Crowdsourced Signa: Schedule system process by Joe Security",
            "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
            "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
            "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
            "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
            "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
            "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
            "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
            "*Themida_2xx. Oreans,Technologies",
            "*Andariel Backdoor Activity (Checkin)",
            "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
            "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
            "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
            "Devices remotely connected, tracked , monitored"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Win.Malware.Ursu-9856871-0",
              "display_name": "Win.Malware.Ursu-9856871-0",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 448,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 5851,
            "hostname": 2580,
            "domain": 1176,
            "URL": 7133,
            "SSLCertFingerprint": 30,
            "email": 3,
            "CVE": 3
          },
          "indicator_count": 17659,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "248 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669ac41b3186b8cc8c40e9e3",
          "name": "Powershell",
          "description": "Matches rule PowerShell Module File Created By Non-PowerShell Process by Nasreddine Bencherchali\nDetects creation of a new PowerShell module \".psm1\", \".psd1\", \".dll\", \".ps1\", etc. by a non-PowerShell process\n\nFilescan.io\nWindowsPowerShell.zip\napplication/zip\nMD5:\n07d37fc575e373f878ae3c7cca2bfc25\nSHA1:\na2fc89aba12f8739184d44d0fffbe6323d9654eb\nSHA256:\ne75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832\nSHA512:\n36dc7349d052cd474818a6ae3149eda469d829cf2e4d9a0e55252468cdf9e9704d5293b8b4f73b4a25b07f8c8dd8eeab2ed18bbb1ff7d76958b51eb555562339\n\nTriage:\nhttps://tria.ge/240719-taxv5aydlj\nhttps://tria.ge/240719-tfpfyasdqh\nhttps://tria.ge/240719-tj9laasfke\nhttps://tria.ge/240719-tnb6kssgmc\nhttps://tria.ge/240719-trwpdsshqh\nhttps://tria.ge/240719-tv84wstbkg\nhttps://tria.ge/240719-t1hh5atcpd\nhttps://tria.ge/240719-t7wpbszgkl\n\nMalcore: https://app.malcore.io/share/652553f6aec33d70a1dbbd25/669993193506cdb760b3f36a\n\nKaspersky: E75FF18EE5C7226E225AA9959DF439F1488DF8CD3D43F5471361ED0426700832",
          "modified": "2024-09-01T17:02:12.379000",
          "created": "2024-07-19T19:52:59.626000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/summary",
            "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/iocs",
            "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/graph",
            "https://www.virustotal.com/graph/embed/g4d28c765e54941129dbbf8d4a8dc25bb3b5452f14e0a4886a0af0c2991188611?theme=dark",
            "https://www.virustotal.com/gui/file/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832/relations",
            "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578339&Signature=fTYUE3KoGSnr2%2BSrv9dZpgk3uXJc2rf%2BQeCyhAVDWiuiHGaYqhFHfgzQD2KheomXUSHne5MCvS9XH1LGW7Xhrg7CIG0gEe5cVjxrkmumne%2B%2Fd%2FBQagomnCKzfbwdExaO45sfA9rz4eQtyfLzFifYoRXDRtJK7P%2BNmISkv0Qz9FGIgXrrPDvmwJevgry%2FaMfiTEa2%2BxSDdWf9e6kdZW5YBVuxEdpGowcPsPEkpbdiSG12pG",
            "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578437&Signature=HM1ThjLEyrQmeLst3eY3osRWxC6ETs2RVbR4uKhN5emP%2Fe3Jbf6OsLPvmoAyaPTh%2B9RLyjIrqyR3f4rwg%2B4kkyiEZCyCkGKSRvQK4zC8eMuq80kOGYcvFLPwtvcH20xe7%2FPhGk2au3z4GfauzR1s8meGtQYRDlmXZARLTB2G0tno%2FJOq8rNm7NLHvVH1MpMBoQ47RRIwE0ecUUSYXmQGMAOQVAgmigrpydiFzFYN2wYJDkmfVTmEc9kylTmQ",
            "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583501&Signature=igubOWmez%2BKPjBiU2Af7vHhJ5SwgwsKaafuyzobymmqUDs%2F8vkuh1A%2BbsMADWo0B%2FBEZht3BD%2B1%2FvItWrcfBgja57sMCBln9vBXfK7nCclcy9%2BeujGu7wlQLlhyfAeGNd8suRdK8x4WrJJ5bdqfAh7Ns0mOjPliF9uu3UJ9I7qH6N5IAd%2Bkb8h7Xce%2F%2BavnF8jLmHHwwCP5ILzgNRc94rmrWFp5eXzxQ3aHd9btY2D",
            "https://vtbehaviour.commondatastorage.googleapis.com/e6f203e988e7aa801739359c6222dcb181d290fc10de5f61d354d43f8557daa0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583905&Signature=QPgFBr8MN1iCe8SwxWZ4BgTfkaViEC4PHLzUrGQ3Jdndo8Z44osVc0CIRcnkJJtNDFU03AM82A8wJ2jMjaFYoEbthsaxPWWufSulM8nS%2BU8RoCr04jUq5GnAWPVNjxukSTbgD0F7pUSf0pVaFwwvpSWCQ6hedQEwF52DQyViV8u9UDOeLii4rkmRlMfMlGIsxIP4CEwy0Gy8Q7Lw6FX8cxG%2FehoJatyiwaFdwwbbLbnu2lQHDaZuwZ38Oy",
            "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583790&Signature=K2lWpuyPxZ8FgvBVeyB6hsfMbuIBkRXd522JtGonUcHxxtwoomV2fuuFbXC5edVAoGPuZJ24D%2Fv7rEHOHYCS2347F4Mq0VQr0PQt68rfbA8DBHTGs1XBS3QFLveflOjIkNzmhJWg23fuvM%2F1Ci0jSxKnR5XeURTArrkbf5eYA72p4QUFMKDgYO6kRpNXHLuDocJdXWjM7AiQ7ZBQdx%2F%2FeNZgb7k7s%2FPTzGuZ%2FTgEvxiGAiaV6PghFIIPSj",
            "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583388&Signature=L5dgUL09kvWOiINZMa%2FvgcDAW5AFV%2Fqie184iaXQKGccuTzwDYsyx0%2BhI%2FxOXIkON%2Bw0RoRuoasFag44WeapuTjlnv8di%2FZ8iWJdeRGqWOdJ8P4EAPZIICsU%2BxjXP%2BzOSNTz5tcekdSceS%2BkTyDYMO%2F9QxZVwsIV1WnvZaGiR%2BOKIfs4YFXgeGWc23ktkKxbRfeKQY1kFyHTh8Re3lBLC%2Fkq%2FExvl7kqxKIebqquWmo%",
            "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583872&Signature=cfVN9vaAZ5UXUaFiEoATwrbKG2RNxzOu3wiH5KMlXdPxTgtpQ920ONEqOhhUb8MNxJwW3AVsCAahYTLdN3FigRPmjIClNTYz%2BoS%2BDl354Z4ZxefdKjl0HJ4%2FmGuzVTBNtc6pftGk4VMAvjgoerYhBf6Olu3ajrMT3h89lKsdBSGc6ra20Btzd%2BzY3Uh1J2gPZ%2BzZPHkTbR0OUTh3oorvIq9Fue8rDbL6PzZLxfPFEZ%2FFCRUnFo",
            "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583838&Signature=dw6B7oYQHQ1CxhfF67YE3TZfvqWvO%2FgErgu9Ms4R462ssOAuET7%2F9guBVvhETqvO7ClziwNXLV%2F31SM7aYXjXEUOmfJtHqf5vpFUCub63bX6a1GILj%2BtbX8EmURT4JftAGT%2BwDdgQnHX3y5MvnWd9NpYE8TTYStcf%2BQOWZLWiMNe%2BSxjpsMyOG2ryZdsm7iCyH%2BWdXrvG%2Bh9ccwxPOnUOwoOxUV3hp1ifVzCkbUtYySGTom29VJ8",
            "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583383&Signature=N7snLsiqkPikwYU0zKl8QxasbcLXiGFXIFaIVT%2FEvzaLWUbnPEkuvuuOAxz9la0bmVndAimDsaexUgrGErDmDbBZ46apRuUnYH3GwBNvZ3YaBIVII4IfP8kDN%2Bi2b3meTPaoyhnWR4UIuYord2Ejg5nAYQ3FJxv4KKyrm8NTlU1cEHTpiBToFL3AVBUOHvCUQ4T1wRMpgO6%2FmyokYYZl8GZa4tjpI%2BncAIOTAfOZePVQ7sAnKHmckU",
            "https://viz.greynoise.io/analysis/b5c2d562-eee0-46cb-8696-0585e3ce27b8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1574.002",
              "name": "DLL Side-Loading",
              "display_name": "T1574.002 - DLL Side-Loading"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1070.006",
              "name": "Timestomp",
              "display_name": "T1070.006 - Timestomp"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [
            "Education",
            "Government",
            "Healthcare",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4402,
            "URL": 1463,
            "domain": 621,
            "hostname": 1159,
            "FileHash-MD5": 423,
            "FileHash-SHA1": 423
          },
          "indicator_count": 8491,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 134,
          "modified_text": "595 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
        "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://twitter.com/juvlarN",
        "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
        "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "https://www.virustotal.com/graph/embed/g4d28c765e54941129dbbf8d4a8dc25bb3b5452f14e0a4886a0af0c2991188611?theme=dark",
        "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/graph",
        "https://www.virustotal.com/gui/file/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832/relations",
        "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
        "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578437&Signature=HM1ThjLEyrQmeLst3eY3osRWxC6ETs2RVbR4uKhN5emP%2Fe3Jbf6OsLPvmoAyaPTh%2B9RLyjIrqyR3f4rwg%2B4kkyiEZCyCkGKSRvQK4zC8eMuq80kOGYcvFLPwtvcH20xe7%2FPhGk2au3z4GfauzR1s8meGtQYRDlmXZARLTB2G0tno%2FJOq8rNm7NLHvVH1MpMBoQ47RRIwE0ecUUSYXmQGMAOQVAgmigrpydiFzFYN2wYJDkmfVTmEc9kylTmQ",
        "bleepingcomputer.com \u2022 CliffsNotes",
        "https://vtbehaviour.commondatastorage.googleapis.com/e6f203e988e7aa801739359c6222dcb181d290fc10de5f61d354d43f8557daa0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583905&Signature=QPgFBr8MN1iCe8SwxWZ4BgTfkaViEC4PHLzUrGQ3Jdndo8Z44osVc0CIRcnkJJtNDFU03AM82A8wJ2jMjaFYoEbthsaxPWWufSulM8nS%2BU8RoCr04jUq5GnAWPVNjxukSTbgD0F7pUSf0pVaFwwvpSWCQ6hedQEwF52DQyViV8u9UDOeLii4rkmRlMfMlGIsxIP4CEwy0Gy8Q7Lw6FX8cxG%2FehoJatyiwaFdwwbbLbnu2lQHDaZuwZ38Oy",
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/iocs",
        "appleid.cdn-apple.com",
        "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
        "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
        "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
        "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
        "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
        "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/summary",
        "Domains Contacted: fenbushijujuefuwu.com",
        "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
        "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
        "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583501&Signature=igubOWmez%2BKPjBiU2Af7vHhJ5SwgwsKaafuyzobymmqUDs%2F8vkuh1A%2BbsMADWo0B%2FBEZht3BD%2B1%2FvItWrcfBgja57sMCBln9vBXfK7nCclcy9%2BeujGu7wlQLlhyfAeGNd8suRdK8x4WrJJ5bdqfAh7Ns0mOjPliF9uu3UJ9I7qH6N5IAd%2Bkb8h7Xce%2F%2BavnF8jLmHHwwCP5ILzgNRc94rmrWFp5eXzxQ3aHd9btY2D",
        "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
        "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
        "developer.x.com \u2022 https://twitter.com/githubstatus",
        "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578339&Signature=fTYUE3KoGSnr2%2BSrv9dZpgk3uXJc2rf%2BQeCyhAVDWiuiHGaYqhFHfgzQD2KheomXUSHne5MCvS9XH1LGW7Xhrg7CIG0gEe5cVjxrkmumne%2B%2Fd%2FBQagomnCKzfbwdExaO45sfA9rz4eQtyfLzFifYoRXDRtJK7P%2BNmISkv0Qz9FGIgXrrPDvmwJevgry%2FaMfiTEa2%2BxSDdWf9e6kdZW5YBVuxEdpGowcPsPEkpbdiSG12pG",
        "*Andariel Backdoor Activity (Checkin)",
        "nr-data.net \u2022 www.youtube.com",
        "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583388&Signature=L5dgUL09kvWOiINZMa%2FvgcDAW5AFV%2Fqie184iaXQKGccuTzwDYsyx0%2BhI%2FxOXIkON%2Bw0RoRuoasFag44WeapuTjlnv8di%2FZ8iWJdeRGqWOdJ8P4EAPZIICsU%2BxjXP%2BzOSNTz5tcekdSceS%2BkTyDYMO%2F9QxZVwsIV1WnvZaGiR%2BOKIfs4YFXgeGWc23ktkKxbRfeKQY1kFyHTh8Re3lBLC%2Fkq%2FExvl7kqxKIebqquWmo%",
        "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://api.w.org/ \u2022 api.w.org",
        "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
        "Crowdsourced Signa: Schedule system process by Joe Security",
        "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583383&Signature=N7snLsiqkPikwYU0zKl8QxasbcLXiGFXIFaIVT%2FEvzaLWUbnPEkuvuuOAxz9la0bmVndAimDsaexUgrGErDmDbBZ46apRuUnYH3GwBNvZ3YaBIVII4IfP8kDN%2Bi2b3meTPaoyhnWR4UIuYord2Ejg5nAYQ3FJxv4KKyrm8NTlU1cEHTpiBToFL3AVBUOHvCUQ4T1wRMpgO6%2FmyokYYZl8GZa4tjpI%2BncAIOTAfOZePVQ7sAnKHmckU",
        "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
        "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
        "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
        "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
        "x.com - Malware Packed",
        "https://viz.greynoise.io/analysis/b5c2d562-eee0-46cb-8696-0585e3ce27b8",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "angryblackwomyn.com",
        "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
        "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583790&Signature=K2lWpuyPxZ8FgvBVeyB6hsfMbuIBkRXd522JtGonUcHxxtwoomV2fuuFbXC5edVAoGPuZJ24D%2Fv7rEHOHYCS2347F4Mq0VQr0PQt68rfbA8DBHTGs1XBS3QFLveflOjIkNzmhJWg23fuvM%2F1Ci0jSxKnR5XeURTArrkbf5eYA72p4QUFMKDgYO6kRpNXHLuDocJdXWjM7AiQ7ZBQdx%2F%2FeNZgb7k7s%2FPTzGuZ%2FTgEvxiGAiaV6PghFIIPSj",
        "discord.com \u2022 discord.gg",
        "api.item.yixun.com",
        "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
        "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
        "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583872&Signature=cfVN9vaAZ5UXUaFiEoATwrbKG2RNxzOu3wiH5KMlXdPxTgtpQ920ONEqOhhUb8MNxJwW3AVsCAahYTLdN3FigRPmjIClNTYz%2BoS%2BDl354Z4ZxefdKjl0HJ4%2FmGuzVTBNtc6pftGk4VMAvjgoerYhBf6Olu3ajrMT3h89lKsdBSGc6ra20Btzd%2BzY3Uh1J2gPZ%2BzZPHkTbR0OUTh3oorvIq9Fue8rDbL6PzZLxfPFEZ%2FFCRUnFo",
        "Devices remotely connected, tracked , monitored",
        "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583838&Signature=dw6B7oYQHQ1CxhfF67YE3TZfvqWvO%2FgErgu9Ms4R462ssOAuET7%2F9guBVvhETqvO7ClziwNXLV%2F31SM7aYXjXEUOmfJtHqf5vpFUCub63bX6a1GILj%2BtbX8EmURT4JftAGT%2BwDdgQnHX3y5MvnWd9NpYE8TTYStcf%2BQOWZLWiMNe%2BSxjpsMyOG2ryZdsm7iCyH%2BWdXrvG%2Bh9ccwxPOnUOwoOxUV3hp1ifVzCkbUtYySGTom29VJ8",
        "*Themida_2xx. Oreans,Technologies",
        "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
        "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
        "The next pulse will show Apple IoC\u2019s related to Tulach.cc",
        "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.cymt-10023133-0",
            "Win.trojan.agent-1371484",
            "Win.packed.stealerc-10017074-0",
            "#lowfi:win32/autoit",
            "Libraryloader",
            "Win.packed.botx-10021462-0",
            "Win.malware.ursu-9856871-0",
            "Alf:heraklezeval:trojan:win32/azorult.fw!rfn",
            "Win.trojan.tofsee-7102058-0",
            "Trojan:win32/mydoom",
            "Html.trojan.ascii212_44_64_202-1",
            "Alfper:hstr:wizremurl.a1",
            "Pws:win32/ymacco.aa50",
            "Win.packed.generic-9967832-0",
            "Win.trojan.barys-10005825-0",
            "Elf:ddos-y\\ [trj]",
            "Trojandropper:win32/muldrop.v!mtb",
            "Win.dropper.quasarrat-10023124-0",
            "Unix.trojan.mirai-9441505-0",
            "Trojanspy:win32/nivdort.de",
            "Trojandownloader:win32/nemucod",
            "Trojanspy:win32/nivdort",
            "Win.malware.razy-6979265-0",
            "Alf:hstr:virtool:win32/obfuscator!pecancer",
            "Win.trojan.zegost-9769410-0",
            "Win.malware.midie-6847893-0",
            "Alf:trojan:win32/cassini_412f60c8!ibt",
            "Backdoor:win32/tofsee.",
            "Win.malware.moonlight-9919383-0",
            "Win.malware.generickdz-9937235-0",
            "Backdoor:win32/tofsee.t",
            "Win.packer.pkr_ce1a-9980177-0",
            "Slf:win32/elenquay.a",
            "Win.malware.jaik-9968280-0",
            "Win.malware.aauto-9839281-0",
            "Win.trojan.vbgeneric-6735875-0",
            "Slfper:softwarebundler:win32/icloader.a",
            "Worm:win32/mofksys.rnd!mtb",
            "Win.malware.swisyn-7610494-0",
            "Worm:win32/lightmoon.h",
            "Unix.trojan.mirai-6981169-0",
            "#lowfijavazkm"
          ],
          "industries": [
            "Education",
            "Telecommunications",
            "Healthcare",
            "Government",
            "Technology"
          ],
          "unique_indicators": 31187
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/comaround.com",
    "whois": "http://whois.domaintools.com/comaround.com",
    "domain": "comaround.com",
    "hostname": "support.comaround.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "69d8a665177b8f64c7ce5fca",
      "name": "LibraryLoader \u2022 Samuel Tulach | Abuse of malicious sssets engineered by DevOp & Security Researcher",
      "description": "Samuel Tulach is involved in various projects related to government work, particularly in areas like DevSecOps and app modernization. \nOverview of Samuel Tulach's \"uploader.exe\"\nThe file \"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines. This classification indicates that the file poses a potential threat to users' systems.\nSecurity Engine Flags. Several security engines have flagged \"uploader.exe\" as malicious.\nSecureAge APEX\tMalicious\nSentinelOne\tMalicious\nImplications of Malicious Flags\nPotential Risks: Files flagged as malicious can lead to various security issues, including data theft, unauthorized access, or system damage.\nRecommended Actions: Users should avoid downloading or executing this file. If already downloaded, it is advisable to delete it and run a full system scan using reputable antivirus software.",
      "modified": "2026-04-10T07:27:33.587000",
      "created": "2026-04-10T07:27:33.587000",
      "tags": [
        "x vercel",
        "united",
        "america",
        "germany malware",
        "family",
        "ck ids",
        "packing",
        "tulach",
        "ocsp",
        "extraction",
        "data upload",
        "enter sc",
        "extra data",
        "include review",
        "exclude sugges",
        "find s",
        "failed",
        "typ no",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "pattern match",
        "mitre att",
        "ascii text",
        "span",
        "title",
        "meta",
        "path",
        "april",
        "hybrid",
        "general",
        "local",
        "encrypt",
        "click",
        "strings",
        "main",
        "footer",
        "pcsb",
        "naga",
        "magda",
        "no expiration",
        "url https",
        "domain",
        "github pages",
        "a domains",
        "passive dns",
        "mtb jan",
        "class",
        "sea x",
        "accept encoding",
        "trojanspy",
        "accept",
        "otx logo",
        "all ipv4",
        "urls",
        "files",
        "america flag",
        "space",
        "ck matrix",
        "handle",
        "winvmaddress",
        "cdecl crashpad",
        "null",
        "software",
        "comment",
        "entity",
        "internal",
        "blank",
        "magic",
        "infinity",
        "first",
        "valentine",
        "error",
        "webview",
        "front",
        "patched",
        "root",
        "tristate",
        "libraryloader",
        "packing t1045",
        "icmp traffic",
        "memcommit",
        "pe section",
        "low software",
        "pe resource",
        "filehash",
        "win32",
        "malware",
        "write",
        "backdoor",
        "present apr",
        "lowfi",
        "aaaa",
        "lowfijavazkm",
        "x.com",
        "dynamicloader",
        "crlf line",
        "unicode text",
        "utf8",
        "ee fc",
        "ff d5",
        "yara rule",
        "f0 ff",
        "eb e1",
        "unknown",
        "trojan",
        "zeppelin",
        "autorun",
        "united states",
        "china unknown",
        "div div",
        "ip address",
        "record value",
        "samuel tulach",
        "czechia unknown",
        "italy unknown",
        "gmt server",
        "all domain",
        "next associated",
        "reverse dns",
        "location czech",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "file type",
        "telfhash",
        "virustotal api",
        "vendor finding",
        "notes clamav",
        "files matching",
        "number",
        "t1045",
        "search",
        "directui",
        "element",
        "medium",
        "classinfobase",
        "value",
        "write c",
        "hwndhost",
        "sapeav12",
        "worm",
        "explorer",
        "insert",
        "movie",
        "mtb apr",
        "mtb mar",
        "trojandropper",
        "displayname",
        "windows",
        "high",
        "delete c",
        "tofsee",
        "stream",
        "push",
        "url http",
        "c mar",
        "virtool",
        "c jan",
        "c dec",
        "toolbar",
        "ransom",
        "article",
        "windows nt",
        "gmtvia",
        "html",
        "bad traffic",
        "et info",
        "tls handshake",
        "belgium",
        "present dec",
        "present feb",
        "intel",
        "elf upx",
        "medium risk",
        "info",
        "moved",
        "hostname add",
        "whois registrar",
        "media",
        "delphi",
        "guard",
        "code",
        "devsecops",
        "github",
        "github internet",
        "archive samuel",
        "tulach",
        "government work",
        "key areas",
        "devops process",
        "security engine",
        "flags",
        "apex malicious",
        "implications",
        "malicious flags",
        "potential risks",
        "name servers",
        "apple id",
        "script urls",
        "show process",
        "secure",
        "win64",
        "khtml",
        "gecko",
        "programfiles",
        "cookie",
        "comspec",
        "model",
        "june",
        "spawns",
        "id name",
        "malicious",
        "gui",
        "anti cheats",
        "game tech",
        "c++"
      ],
      "references": [
        "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
        "bleepingcomputer.com \u2022 CliffsNotes",
        "x.com - Malware Packed",
        "nr-data.net \u2022 www.youtube.com",
        "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "discord.com \u2022 discord.gg",
        "api.item.yixun.com",
        "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
        "Domains Contacted: fenbushijujuefuwu.com",
        "angryblackwomyn.com",
        "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
        "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
        "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
        "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
        "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
        "https://api.w.org/ \u2022 api.w.org",
        "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
        "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
        "developer.x.com \u2022 https://twitter.com/githubstatus",
        "https://twitter.com/juvlarN",
        "appleid.cdn-apple.com",
        "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
        "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
        "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
        "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
        "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
        "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
        "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
        "The next pulse will show Apple IoC\u2019s related to Tulach.cc"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "LibraryLoader",
          "display_name": "LibraryLoader",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
          "target": null
        },
        {
          "id": "Win.Packed.Botx-10021462-0",
          "display_name": "Win.Packed.Botx-10021462-0",
          "target": null
        },
        {
          "id": "Win.Malware.Cymt-10023133-0",
          "display_name": "Win.Malware.Cymt-10023133-0",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Nemucod",
          "display_name": "TrojanDownloader:Win32/Nemucod",
          "target": "/malware/TrojanDownloader:Win32/Nemucod"
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Generickdz-9937235-0",
          "display_name": "Win.Malware.Generickdz-9937235-0",
          "target": null
        },
        {
          "id": "Win.Malware.Razy-6979265-0",
          "display_name": "Win.Malware.Razy-6979265-0",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.DE",
          "display_name": "TrojanSpy:Win32/Nivdort.DE",
          "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
        },
        {
          "id": "SLF:Win32/Elenquay.A",
          "display_name": "SLF:Win32/Elenquay.A",
          "target": "/malware/SLF:Win32/Elenquay.A"
        },
        {
          "id": "Win.Dropper.QuasarRAT-10023124-0",
          "display_name": "Win.Dropper.QuasarRAT-10023124-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Zegost-9769410-0",
          "display_name": "Win.Trojan.Zegost-9769410-0",
          "target": null
        },
        {
          "id": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
          "display_name": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
          "target": null
        },
        {
          "id": "Win.Malware.Moonlight-9919383-0",
          "display_name": "Win.Malware.Moonlight-9919383-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "Backdoor:Win32/Tofsee.",
          "display_name": "Backdoor:Win32/Tofsee.",
          "target": "/malware/Backdoor:Win32/Tofsee."
        },
        {
          "id": "#LowfiJavaZKM",
          "display_name": "#LowfiJavaZKM",
          "target": null
        },
        {
          "id": "Win.Malware.Swisyn-7610494-0",
          "display_name": "Win.Malware.Swisyn-7610494-0",
          "target": null
        },
        {
          "id": "PWS:Win32/Ymacco.AA50",
          "display_name": "PWS:Win32/Ymacco.AA50",
          "target": "/malware/PWS:Win32/Ymacco.AA50"
        },
        {
          "id": "Win.Packed.Stealerc-10017074-0",
          "display_name": "Win.Packed.Stealerc-10017074-0",
          "target": null
        },
        {
          "id": "#Lowfi:Win32/AutoIt",
          "display_name": "#Lowfi:Win32/AutoIt",
          "target": "/malware/#Lowfi:Win32/AutoIt"
        },
        {
          "id": "Html.Trojan.Ascii212_44_64_202-1",
          "display_name": "Html.Trojan.Ascii212_44_64_202-1",
          "target": null
        },
        {
          "id": "ALFPER:HSTR:WizremURL.A1",
          "display_name": "ALFPER:HSTR:WizremURL.A1",
          "target": null
        },
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0",
          "display_name": "Win.Trojan.Tofsee-7102058-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0",
          "display_name": "Win.Trojan.Tofsee-7102058-0",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847893-0",
          "display_name": "Win.Malware.Midie-6847893-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Muldrop.V!MTB",
          "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
          "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Win.Malware.Aauto-9839281-0",
          "display_name": "Win.Malware.Aauto-9839281-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-1371484",
          "display_name": "Win.Trojan.Agent-1371484",
          "target": null
        },
        {
          "id": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
          "display_name": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
          "display_name": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-9441505-0",
          "display_name": "Unix.Trojan.Mirai-9441505-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2710,
        "domain": 1227,
        "hostname": 1206,
        "FileHash-SHA256": 3867,
        "IPv4": 318,
        "FileHash-MD5": 593,
        "FileHash-SHA1": 459,
        "IPv6": 1,
        "SSLCertFingerprint": 19,
        "email": 20,
        "CVE": 1
      },
      "indicator_count": 10421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "9 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6875e98438889e51b3fdd18f",
      "name": "Critical \u2022 Schedule system process - Mirai | Foundry Overwatch",
      "description": "",
      "modified": "2025-08-14T05:04:16.839000",
      "created": "2025-07-15T05:39:16.652000",
      "tags": [
        "win32 exe",
        "country",
        "include review",
        "exclude",
        "defense evasion",
        "access ta0006",
        "command",
        "control ta0011",
        "impact ta0040",
        "impact ob0008",
        "file system",
        "system oc0008",
        "match unknown",
        "adversaries",
        "match info",
        "info",
        "execution flow",
        "t1574 dll",
        "tries",
        "registry",
        "modify system",
        "process t1543",
        "unknown",
        "window",
        "ob0009 install",
        "ob0012 install",
        "insecure",
        "b0047 modify",
        "registry e1112",
        "hidden files",
        "registry run",
        "keys",
        "startup folder",
        "f0012 file",
        "critical",
        "united",
        "as15169",
        "delete c",
        "as16509",
        "show",
        "search",
        "intel",
        "ms windows",
        "entries",
        "medium",
        "worm",
        "copy",
        "write",
        "explorer",
        "malware",
        "next",
        "present jul",
        "status",
        "date",
        "ip address",
        "domain",
        "servers",
        "showing",
        "unknown ns",
        "related pulses",
        "pulses",
        "tags",
        "related tags",
        "more file",
        "type",
        "date april",
        "am size",
        "sha1 sha256",
        "as14618",
        "united kingdom",
        "as54113",
        "as15133 verizon",
        "top source",
        "top destination",
        "status domain",
        "ip whitelisted",
        "whitelisted",
        "tcp include",
        "source source",
        "oamazon",
        "cnamazon rsa",
        "odigicert inc",
        "sweden as20940",
        "as20940",
        "entries tls",
        "ip destination",
        "encrypt",
        "aaaa",
        "found",
        "certificate",
        "next associated",
        "urls show",
        "date checked",
        "error",
        "windows",
        "high",
        "yara detections",
        "installs",
        "checks",
        "filehash",
        "sha256 add",
        "themida",
        "data upload",
        "extraction",
        "md5 add",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "win32",
        "ddos",
        "passive dns",
        "activity",
        "checkin",
        "win64",
        "mtb jan",
        "lowfi",
        "trojan",
        "ransom",
        "trojandropper",
        "yara",
        "nsis",
        "nss bv",
        "su data",
        "windo alerts",
        "andariel",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "id deadhost",
        "connects",
        "andariel high",
        "richhash",
        "external",
        "virustotal api",
        "screenshots",
        "failed",
        "auurtonany data",
        "themida andarie",
        "present may",
        "japan unknown",
        "unknown cname",
        "domain add",
        "urls",
        "files",
        "http headers",
        "msie",
        "windows nt",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "wget command",
        "devices home",
        "execution",
        "foundry",
        "home networks",
        "mirai",
        "x.com",
        "porn",
        "monitored target",
        "d link",
        "targets"
      ],
      "references": [
        "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
        "Crowdsourced Signa: Schedule system process by Joe Security",
        "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
        "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
        "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
        "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
        "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
        "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
        "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
        "*Themida_2xx. Oreans,Technologies",
        "*Andariel Backdoor Activity (Checkin)",
        "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
        "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
        "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
        "Devices remotely connected, tracked , monitored"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Win.Malware.Ursu-9856871-0",
          "display_name": "Win.Malware.Ursu-9856871-0",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 448,
        "FileHash-SHA1": 435,
        "FileHash-SHA256": 5851,
        "hostname": 2580,
        "domain": 1176,
        "URL": 7133,
        "SSLCertFingerprint": 30,
        "email": 3,
        "CVE": 3
      },
      "indicator_count": 17659,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "248 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "669ac41b3186b8cc8c40e9e3",
      "name": "Powershell",
      "description": "Matches rule PowerShell Module File Created By Non-PowerShell Process by Nasreddine Bencherchali\nDetects creation of a new PowerShell module \".psm1\", \".psd1\", \".dll\", \".ps1\", etc. by a non-PowerShell process\n\nFilescan.io\nWindowsPowerShell.zip\napplication/zip\nMD5:\n07d37fc575e373f878ae3c7cca2bfc25\nSHA1:\na2fc89aba12f8739184d44d0fffbe6323d9654eb\nSHA256:\ne75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832\nSHA512:\n36dc7349d052cd474818a6ae3149eda469d829cf2e4d9a0e55252468cdf9e9704d5293b8b4f73b4a25b07f8c8dd8eeab2ed18bbb1ff7d76958b51eb555562339\n\nTriage:\nhttps://tria.ge/240719-taxv5aydlj\nhttps://tria.ge/240719-tfpfyasdqh\nhttps://tria.ge/240719-tj9laasfke\nhttps://tria.ge/240719-tnb6kssgmc\nhttps://tria.ge/240719-trwpdsshqh\nhttps://tria.ge/240719-tv84wstbkg\nhttps://tria.ge/240719-t1hh5atcpd\nhttps://tria.ge/240719-t7wpbszgkl\n\nMalcore: https://app.malcore.io/share/652553f6aec33d70a1dbbd25/669993193506cdb760b3f36a\n\nKaspersky: E75FF18EE5C7226E225AA9959DF439F1488DF8CD3D43F5471361ED0426700832",
      "modified": "2024-09-01T17:02:12.379000",
      "created": "2024-07-19T19:52:59.626000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/summary",
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/iocs",
        "https://www.virustotal.com/gui/collection/9d356233d4019b57b09902b22067bcbc11c1b5df759daaf494d859f540aaa399/graph",
        "https://www.virustotal.com/graph/embed/g4d28c765e54941129dbbf8d4a8dc25bb3b5452f14e0a4886a0af0c2991188611?theme=dark",
        "https://www.virustotal.com/gui/file/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832/relations",
        "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578339&Signature=fTYUE3KoGSnr2%2BSrv9dZpgk3uXJc2rf%2BQeCyhAVDWiuiHGaYqhFHfgzQD2KheomXUSHne5MCvS9XH1LGW7Xhrg7CIG0gEe5cVjxrkmumne%2B%2Fd%2FBQagomnCKzfbwdExaO45sfA9rz4eQtyfLzFifYoRXDRtJK7P%2BNmISkv0Qz9FGIgXrrPDvmwJevgry%2FaMfiTEa2%2BxSDdWf9e6kdZW5YBVuxEdpGowcPsPEkpbdiSG12pG",
        "https://vtbehaviour.commondatastorage.googleapis.com/e75ff18ee5c7226e225aa9959df439f1488df8cd3d43f5471361ed0426700832_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721578437&Signature=HM1ThjLEyrQmeLst3eY3osRWxC6ETs2RVbR4uKhN5emP%2Fe3Jbf6OsLPvmoAyaPTh%2B9RLyjIrqyR3f4rwg%2B4kkyiEZCyCkGKSRvQK4zC8eMuq80kOGYcvFLPwtvcH20xe7%2FPhGk2au3z4GfauzR1s8meGtQYRDlmXZARLTB2G0tno%2FJOq8rNm7NLHvVH1MpMBoQ47RRIwE0ecUUSYXmQGMAOQVAgmigrpydiFzFYN2wYJDkmfVTmEc9kylTmQ",
        "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583501&Signature=igubOWmez%2BKPjBiU2Af7vHhJ5SwgwsKaafuyzobymmqUDs%2F8vkuh1A%2BbsMADWo0B%2FBEZht3BD%2B1%2FvItWrcfBgja57sMCBln9vBXfK7nCclcy9%2BeujGu7wlQLlhyfAeGNd8suRdK8x4WrJJ5bdqfAh7Ns0mOjPliF9uu3UJ9I7qH6N5IAd%2Bkb8h7Xce%2F%2BavnF8jLmHHwwCP5ILzgNRc94rmrWFp5eXzxQ3aHd9btY2D",
        "https://vtbehaviour.commondatastorage.googleapis.com/e6f203e988e7aa801739359c6222dcb181d290fc10de5f61d354d43f8557daa0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583905&Signature=QPgFBr8MN1iCe8SwxWZ4BgTfkaViEC4PHLzUrGQ3Jdndo8Z44osVc0CIRcnkJJtNDFU03AM82A8wJ2jMjaFYoEbthsaxPWWufSulM8nS%2BU8RoCr04jUq5GnAWPVNjxukSTbgD0F7pUSf0pVaFwwvpSWCQ6hedQEwF52DQyViV8u9UDOeLii4rkmRlMfMlGIsxIP4CEwy0Gy8Q7Lw6FX8cxG%2FehoJatyiwaFdwwbbLbnu2lQHDaZuwZ38Oy",
        "https://vtbehaviour.commondatastorage.googleapis.com/460264c62a85a79d25424920b7b80763354151146da5cba933c198ebbe9a0588_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583790&Signature=K2lWpuyPxZ8FgvBVeyB6hsfMbuIBkRXd522JtGonUcHxxtwoomV2fuuFbXC5edVAoGPuZJ24D%2Fv7rEHOHYCS2347F4Mq0VQr0PQt68rfbA8DBHTGs1XBS3QFLveflOjIkNzmhJWg23fuvM%2F1Ci0jSxKnR5XeURTArrkbf5eYA72p4QUFMKDgYO6kRpNXHLuDocJdXWjM7AiQ7ZBQdx%2F%2FeNZgb7k7s%2FPTzGuZ%2FTgEvxiGAiaV6PghFIIPSj",
        "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583388&Signature=L5dgUL09kvWOiINZMa%2FvgcDAW5AFV%2Fqie184iaXQKGccuTzwDYsyx0%2BhI%2FxOXIkON%2Bw0RoRuoasFag44WeapuTjlnv8di%2FZ8iWJdeRGqWOdJ8P4EAPZIICsU%2BxjXP%2BzOSNTz5tcekdSceS%2BkTyDYMO%2F9QxZVwsIV1WnvZaGiR%2BOKIfs4YFXgeGWc23ktkKxbRfeKQY1kFyHTh8Re3lBLC%2Fkq%2FExvl7kqxKIebqquWmo%",
        "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583872&Signature=cfVN9vaAZ5UXUaFiEoATwrbKG2RNxzOu3wiH5KMlXdPxTgtpQ920ONEqOhhUb8MNxJwW3AVsCAahYTLdN3FigRPmjIClNTYz%2BoS%2BDl354Z4ZxefdKjl0HJ4%2FmGuzVTBNtc6pftGk4VMAvjgoerYhBf6Olu3ajrMT3h89lKsdBSGc6ra20Btzd%2BzY3Uh1J2gPZ%2BzZPHkTbR0OUTh3oorvIq9Fue8rDbL6PzZLxfPFEZ%2FFCRUnFo",
        "https://vtbehaviour.commondatastorage.googleapis.com/d2cb7cca87c98c4d7a7eb9a40e0f00a231390cfe2f4786e161471a5ca4397a41_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583838&Signature=dw6B7oYQHQ1CxhfF67YE3TZfvqWvO%2FgErgu9Ms4R462ssOAuET7%2F9guBVvhETqvO7ClziwNXLV%2F31SM7aYXjXEUOmfJtHqf5vpFUCub63bX6a1GILj%2BtbX8EmURT4JftAGT%2BwDdgQnHX3y5MvnWd9NpYE8TTYStcf%2BQOWZLWiMNe%2BSxjpsMyOG2ryZdsm7iCyH%2BWdXrvG%2Bh9ccwxPOnUOwoOxUV3hp1ifVzCkbUtYySGTom29VJ8",
        "https://vtbehaviour.commondatastorage.googleapis.com/3a498e611cdc305e0ce67b68971ebc9e8b8aa575e9de08ae4bb081e1f6b87945_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1721583383&Signature=N7snLsiqkPikwYU0zKl8QxasbcLXiGFXIFaIVT%2FEvzaLWUbnPEkuvuuOAxz9la0bmVndAimDsaexUgrGErDmDbBZ46apRuUnYH3GwBNvZ3YaBIVII4IfP8kDN%2Bi2b3meTPaoyhnWR4UIuYord2Ejg5nAYQ3FJxv4KKyrm8NTlU1cEHTpiBToFL3AVBUOHvCUQ4T1wRMpgO6%2FmyokYYZl8GZa4tjpI%2BncAIOTAfOZePVQ7sAnKHmckU",
        "https://viz.greynoise.io/analysis/b5c2d562-eee0-46cb-8696-0585e3ce27b8"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1574.002",
          "name": "DLL Side-Loading",
          "display_name": "T1574.002 - DLL Side-Loading"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1070.006",
          "name": "Timestomp",
          "display_name": "T1070.006 - Timestomp"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [
        "Education",
        "Government",
        "Healthcare",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 4402,
        "URL": 1463,
        "domain": 621,
        "hostname": 1159,
        "FileHash-MD5": 423,
        "FileHash-SHA1": 423
      },
      "indicator_count": 8491,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 134,
      "modified_text": "595 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://support.comaround.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://support.comaround.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776639158.673043
}