{
  "type": "URL",
  "indicator": "https://support.defendercameras.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://support.defendercameras.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2913389291,
      "indicator": "https://support.defendercameras.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 16,
      "pulses": [
        {
          "id": "6923408464566e39caf32285",
          "name": "Discord- DNS | Malvertizing | Ransom/Msilzilla (sifting IoC\u2019s created by scnrscnr)",
          "description": "TAGS\nActive\n443 ma2592000\nChristopher Pool\nPool's Closed\nTimothy Pool\na li\n google\namerica att\napache\napache ip\nasn as46606\nauditmode force\nbehavior\nbinary\nbinary file\nbk role\nchat\ncheck\nchrome\nck ids\ncommon stealer\ncookie\ndata upload\ndefender\ndelete c\ndirectui\ndiscord\ndns lookup\ndomain add\ndrop\ndynamicloader\neb d8\nee fc\nerror oct\nexplorer\nexternal ip\nextraction\nf0 ff\nfailed\nff bb\nff d5\nff ff\nfiles\nfoundry\ngmt content\ngmt etag\ngmt server\ngoogle chrome\nguard\nhigh\ninsert\nlolminer\nmalware\nmedia\nmeta\nmoved\nmovie\nmsie\nmsvisualbasic60\nmtb aug -present \nneversend\npowershell\nrelated nids\nresponse ip\nself\nservice domain\nsingapore\nsmartassembly\nspan\nspan a\nsx08x00x00a\ntargeting\ntls sni\ntrojan\ntrojandropper\ntwitter\ntx08x00x00n\nunique\nuser agent\nux08x00x00h\nvirtool\nvirustotal api\nvoice\nvx08x00x00j\nwrite\nwrite c\nwx08x00x00\nx08x00x00b\nx08x00x00x00\nyara\nyara rule\nyx08x00x00l\nz3je\nz3uwq7\nzx08x00x00",
          "modified": "2025-12-23T16:04:54.329000",
          "created": "2025-11-23T17:12:36.917000",
          "tags": [
            "no expiration",
            "expiration",
            "url https",
            "url http",
            "filehashsha256",
            "hostname",
            "domain",
            "filehashmd5",
            "filehashsha1",
            "ipv4",
            "code",
            "pool",
            "timothy pool",
            "z3je z3uwq7",
            "creation date",
            "ip address",
            "emails",
            "expiration date",
            "status",
            "hostname add",
            "pulse pulses",
            "passive dns",
            "urls",
            "date"
          ],
          "references": [
            "https://otx.alienvault.com/pulse/5fa57698ac0f6638b7b9a8ba",
            "Examining pulse created by scnrscnr is worth reviewing. I was surprised tonal see a targets name.I didn\u2019t see Foundry highlighted",
            "http://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com",
            "https://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com \u2022 www.techcult.com/judge-the-simpsons-parody-is-child-pornography/ Whitelisted domain techcult.com\t  Domain blogspot.com Whitelisted domain blogspot.com\t  Domain techcult.com Whitelisted domain techcult.com\t  Hostname aninditaannisa.blogspot.com \u2022 domain blogspot.com",
            "www.techcult.com",
            "http://foundry.tartarynova.com phishing \u2022  https://foundry.tartarynova.com \u2022 foundry.tartarynova.com",
            "https://trail.truefoundry.com/api/t/c/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE/enc_U2FsdGVkX1_wWHRx9nPGCEspZpUcIwc1yphMTxaaQ2ZAbsxOqRR4ibXcaYtcmgJ1UgabTFCHVVBLx2oAnBAW2h8el_edjHN72Ug0yKQePjKnSJEOnQvtq8MUPo0vkU1N",
            "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_L9bYYgL2HGng9mDsC",
            "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE",
            "truefoundry.com \u2022  assets.production.truefoundry.com \u2022 cpt.llm-gateway.truefoundry.com",
            "yyz.llm-gateway.truefoundry.com \u2022 trail.truefoundry.com \u2022  sin.llm-gateway.truefoundry.com",
            "lm-gateway.truefoundry.com \u2022 https://assets.production.truefoundry.com/sample-openapi.json",
            "162.159.128.233 \u2022 http://tsar.vicly.org \u2022 https://tsar.vicly.org \u2022 tsar.vicly.org \u2022 vicly.org \u2022 https://tsar.vicly.org/",
            "http://scteamcommunity.com/4k-high-res-porn-videos/squirt phishing",
            "http://pic.porn.hub-accessories.site \u2022 https://pic.porn.hub-accessories.site \u2022 pic.porn.hub-accessories.site",
            "2022ww11.pornhubgsy.com \u2022 http://scteamcommunity.com/4k-high-res-porn-videos/squirt",
            "IDS Detections: Observed Discord Domain in DNS Lookup (discord .com) Discord Chat Service Domain in DNS Lookup (discord .com)",
            "IDS Detections: Observed Discord Domain (discord .com in TLS SNI)",
            "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "IDS Detections: Observed Discord Domain (discordapp .com in TLS SNI) Observed Discord Service Domain (discord .com) in TLS SNI Less",
            "Yara: Detections ConventionEngine_Term_Users",
            "Yara:  ConventionEngine_Anomaly_MultiPDB_Double ,  ConventionEngine_Term_Documents",
            "Alerts: infostealer_browser infostealer_cookies binary_yara procmem_yara static_pe_anomaly",
            "Alerts: pe_compile_timestomping antiav_detectfile antidebug_guardpages encrypted_ioc",
            "Alerts: dynamic_function_loading  injection_write_process reads_memory_remote_process",
            "Alerts : network_cnc_https_generic reads_self packer_entropy injection_rwx uses_windows_utilities antivm_checks_available_memory queries_computer_name queries_user_name",
            "Yara : MS_Visual_Basic_6_0 ,",
            "Yara : UPX , Nrv2x , UPX_OEP_place , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser",
            "Alerts : ransomware_file_modifications stealth_file procmem_yara static_pe_anomaly",
            "Alerts: disables_folder_options stealth_hidden_extension stealth_hiddenreg anomalous_deletefile",
            "Alerts:  mouse_movement_detect",
            "Couldn\u2019t pulse 1st pulse so here\u2019s what\u2019s left",
            "scnrscnr pulse is good. I\u2019m assuming they\u2019re targets.",
            "Foundry stalking."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanDropper:Win32/VB.IL0",
              "display_name": "TrojanDropper:Win32/VB.IL0",
              "target": "/malware/TrojanDropper:Win32/VB.IL0"
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_56a3061!ibt",
              "display_name": "ALF:Trojan:Win32/Cassini_56a3061!ibt",
              "target": null
            },
            {
              "id": "Win.Ransomware.Msilzilla-10014498-0",
              "display_name": "Win.Ransomware.Msilzilla-10014498-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1443",
              "name": "Remotely Install Application",
              "display_name": "T1443 - Remotely Install Application"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 773,
            "FileHash-SHA1": 684,
            "FileHash-SHA256": 1910,
            "CVE": 2,
            "SSLCertFingerprint": 4,
            "URL": 3783,
            "domain": 878,
            "email": 7,
            "hostname": 1913
          },
          "indicator_count": 9954,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "118 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e77c7c488546842f94848c",
          "name": "Injection \u2022 FormBook",
          "description": "Insane",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-05T20:11:40.389000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 66,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "746 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e7832f3d5621ae81a5c4c2",
          "name": "Injection \u2022 FormBook ",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-05T20:40:15.678000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 63,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "746 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea63bd597387fdaccd36bd",
          "name": "Injection \u2022 FormBook",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-08T01:02:53.039000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "746 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eba0786d5bbd4f31a60c17",
          "name": "Injection \u2022 FormBook",
          "description": "",
          "modified": "2024-04-04T19:04:12.599000",
          "created": "2024-03-08T23:34:16.648000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "march",
            "historical ssl",
            "threat roundup",
            "contacted",
            "referrer",
            "resolutions",
            "siblings domain",
            "malicious",
            "malware",
            "metro",
            "whois whois",
            "hackers utilize",
            "contacted urls",
            "lowfi",
            "date hash",
            "avast avg",
            "msdefender feb",
            "vendor finding",
            "notes avast",
            "win32",
            "ms defender",
            "trojanspy",
            "files matching",
            "number",
            "sample analysis",
            "copy",
            "hide samples",
            "as133618",
            "trojan",
            "passive dns",
            "ransom",
            "entries",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "encrypt",
            "virtool",
            "body",
            "click",
            "date",
            "artro",
            "script urls",
            "asnone united",
            "unknown",
            "as2635",
            "united",
            "search",
            "showing",
            "title",
            "moved",
            "script domains",
            "bypass",
            "tools",
            "meta",
            "cookie",
            "next",
            "urls",
            "address",
            "creation date",
            "dnssec",
            "protect",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "xfbml1",
            "t1676916559",
            "ucddaocjgah",
            "rhttps",
            "hostname",
            "virgin islands",
            "cname",
            "as47846",
            "germany unknown",
            "as44273 host",
            "as45638",
            "pty ltd",
            "name servers",
            "hostnames",
            "urls https",
            "cryp",
            "bq apr",
            "servers",
            "pulse submit",
            "url analysis",
            "files",
            "ip address",
            "domain",
            "emails",
            "expiration date",
            "canada unknown",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "formbook cnc",
            "checkin",
            "cape",
            "formbook",
            "windows",
            "rc2i",
            "powershell",
            "write",
            "mccormick",
            "photos",
            "design og",
            "html info",
            "title works",
            "design meta",
            "tags og",
            "wordpress",
            "woocommerce",
            "design trackers",
            "status",
            "as131316 slnet",
            "as14061",
            "win32upatre mar",
            "win32imali mar",
            "injection",
            "http response",
            "final url",
            "serving ip",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "acceptencoding",
            "apache",
            "upgrade",
            "keepalive",
            "show",
            "pe32",
            "intel",
            "ms windows",
            "markus",
            "hallrender",
            "songculture attacked",
            "tsara brashears",
            "scott mccormick",
            "aurora",
            "colorado",
            "rexxfield",
            "m brian sabey",
            "rally",
            "analyze",
            "targeted",
            "nxdomain",
            "as397240",
            "as22612",
            "record value",
            "for privacy",
            "aaaa",
            "alienvault",
            "open threat",
            "hit",
            "men",
            "man",
            "reredrum",
            "monitoring"
          ],
          "references": [
            "https://www.mccormick-designs.com",
            "http://www.sheraises.com/wcur/ [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
            "72.167.124.187  [phishing]",
            "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
            "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
            "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
            "www.jamesbgriffinlaw.com (toolbox)",
            "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
            "nr-data.net [Apple Private Data Collection]",
            "applephonenw.com [governmentattic]",
            "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
            "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
            "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
            "http://mcbut.live (Not present? Absent today - unexcused)",
            "thecomments.app"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Australia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Ransom:Win32/Teerac.A",
              "display_name": "Ransom:Win32/Teerac.A",
              "target": "/malware/Ransom:Win32/Teerac.A"
            },
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.O",
              "display_name": "TrojanDownloader:Win32/Upatre.O",
              "target": "/malware/TrojanDownloader:Win32/Upatre.O"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
              "target": null
            },
            {
              "id": "Win.Trojan",
              "display_name": "Win.Trojan",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-64721",
              "display_name": "Win.Trojan.Zbot-64721",
              "target": null
            },
            {
              "id": "Win.Dropper.Remcos-9970861-0",
              "display_name": "Win.Dropper.Remcos-9970861-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/Imali",
              "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
              "target": null
            },
            {
              "id": "Win.Trojan.NSIS-41",
              "display_name": "Win.Trojan.NSIS-41",
              "target": null
            },
            {
              "id": "Win.Trojan.Airinstall-1",
              "display_name": "Win.Trojan.Airinstall-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e77c7c488546842f94848c",
          "export_count": 62,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4708,
            "hostname": 1810,
            "FileHash-MD5": 254,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1631,
            "domain": 2741,
            "CVE": 3,
            "email": 11
          },
          "indicator_count": 11371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "746 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bbca54daebb7d2084f350d",
          "name": "Phishing HSBC (identity theft) -  Hijack Execution Flow",
          "description": "Hijack Execution Flow: Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.\n\nThere are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.",
          "modified": "2024-03-02T16:00:27.416000",
          "created": "2024-02-01T16:44:04.317000",
          "tags": [
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist http",
            "hsbc group",
            "phishtank http",
            "phishing hsbc",
            "traffic",
            "tor exit",
            "exit",
            "node tcp",
            "et tor",
            "known tor",
            "tor known",
            "http spammer",
            "node",
            "spammer",
            "malicious",
            "malware",
            "team",
            "download",
            "http response",
            "final url",
            "xamzexpires600",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "algorithm",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "server",
            "registrar abuse",
            "iana id",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "llc registry",
            "expiry date",
            "date",
            "dns replication",
            "basic",
            "pe32 executable",
            "ms windows",
            "intel",
            "win32 dynamic",
            "link library",
            "os2 executable",
            "clipper dos",
            "executable",
            "pe32",
            "win16 ne",
            "pe32 installer",
            "mitre"
          ],
          "references": [
            "http://www.tripphouse.com/th_ext.php",
            "www.tripphouse.com",
            "https://attack.mitre.org/techniques/T1574/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Phishing HSBC",
              "display_name": "Phishing HSBC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2190,
            "FileHash-SHA1": 244,
            "FileHash-SHA256": 775,
            "URL": 2229,
            "domain": 545,
            "hostname": 723,
            "CVE": 1,
            "email": 2
          },
          "indicator_count": 6709,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "779 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a67da62bb520508659a5",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:51:09.511000",
          "created": "2023-12-06T16:51:09.511000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a67567202b93ee502ff7",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:51:00.527000",
          "created": "2023-12-06T16:51:00.527000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a66d9992e6957b2d1415",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:50:53.855000",
          "created": "2023-12-06T16:50:53.855000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a667be1f5233855ae115",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:50:47.344000",
          "created": "2023-12-06T16:50:47.344000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fa9e514ca975b6db5ca",
          "name": "NYTIMES.COM",
          "description": "",
          "modified": "2023-12-06T14:05:29.348000",
          "created": "2023-12-06T14:05:29.348000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 936,
            "hostname": 1927,
            "URL": 4576,
            "domain": 989,
            "email": 2,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 4
          },
          "indicator_count": 8437,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5300c7fbb0ebe0aad3",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:08:51.070000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5622544406ab139161",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:08:53.825000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5d65c4b99d76421b48",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:09:01.502000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a60be1d9162d87c5e93",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:09:04.704000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "907 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "621e371e2a74a1182e30386b",
          "name": "NYTIMES.COM",
          "description": "",
          "modified": "2022-03-31T00:02:44.795000",
          "created": "2022-03-01T15:09:18.236000",
          "tags": [
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "v3 serial",
            "number",
            "issuer",
            "cncomodo rsa",
            "secure server",
            "ca cgb",
            "ca limited",
            "subject public",
            "key info",
            "key algorithm",
            "x509v3 key",
            "first",
            "server",
            "markmonitor",
            "date",
            "registrar abuse",
            "contact phone",
            "domain status",
            "registrar url",
            "registrar whois",
            "email",
            "registry domain",
            "code",
            "moves",
            "microsoft",
            "qianxin reddrip",
            "subdomains",
            "sophos news",
            "comodo valkyrie",
            "verdict mobile",
            "news popularity",
            "ranks rank",
            "value ingestion",
            "umbrella"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4576,
            "FileHash-SHA256": 936,
            "hostname": 1927,
            "domain": 989,
            "CVE": 1,
            "email": 2,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 4
          },
          "indicator_count": 8437,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1481 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts : network_cnc_https_generic reads_self packer_entropy injection_rwx uses_windows_utilities antivm_checks_available_memory queries_computer_name queries_user_name",
        "http://www.sheraises.com/wcur/ [phishing]",
        "http://www.tripphouse.com/th_ext.php",
        "Yara : MS_Visual_Basic_6_0 ,",
        "Yara : UPX , Nrv2x , UPX_OEP_place , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser",
        "Alerts: disables_folder_options stealth_hidden_extension stealth_hiddenreg anomalous_deletefile",
        "Yara: Detections ConventionEngine_Term_Users",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "Alerts: pe_compile_timestomping antiav_detectfile antidebug_guardpages encrypted_ioc",
        "Foundry stalking.",
        "https://attack.mitre.org/techniques/T1574/",
        "Yara:  ConventionEngine_Anomaly_MultiPDB_Double ,  ConventionEngine_Term_Documents",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "nr-data.net [Apple Private Data Collection]",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE",
        "Examining pulse created by scnrscnr is worth reviewing. I was surprised tonal see a targets name.I didn\u2019t see Foundry highlighted",
        "lm-gateway.truefoundry.com \u2022 https://assets.production.truefoundry.com/sample-openapi.json",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "Alerts : ransomware_file_modifications stealth_file procmem_yara static_pe_anomaly",
        "162.159.128.233 \u2022 http://tsar.vicly.org \u2022 https://tsar.vicly.org \u2022 tsar.vicly.org \u2022 vicly.org \u2022 https://tsar.vicly.org/",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "applephonenw.com [governmentattic]",
        "http://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com",
        "2022ww11.pornhubgsy.com \u2022 http://scteamcommunity.com/4k-high-res-porn-videos/squirt",
        "72.167.124.187  [phishing]",
        "https://trail.truefoundry.com/api/t/c/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE/enc_U2FsdGVkX1_wWHRx9nPGCEspZpUcIwc1yphMTxaaQ2ZAbsxOqRR4ibXcaYtcmgJ1UgabTFCHVVBLx2oAnBAW2h8el_edjHN72Ug0yKQePjKnSJEOnQvtq8MUPo0vkU1N",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "http://foundry.tartarynova.com phishing \u2022  https://foundry.tartarynova.com \u2022 foundry.tartarynova.com",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "www.tripphouse.com",
        "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_L9bYYgL2HGng9mDsC",
        "Alerts: infostealer_browser infostealer_cookies binary_yara procmem_yara static_pe_anomaly",
        "Couldn\u2019t pulse 1st pulse so here\u2019s what\u2019s left",
        "Alerts:  mouse_movement_detect",
        "IDS Detections: Observed Discord Domain (discordapp .com in TLS SNI) Observed Discord Service Domain (discord .com) in TLS SNI Less",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://otx.alienvault.com/pulse/5fa57698ac0f6638b7b9a8ba",
        "IDS Detections: Observed Discord Domain in DNS Lookup (discord .com) Discord Chat Service Domain in DNS Lookup (discord .com)",
        "IDS Detections: Observed Discord Domain (discord .com in TLS SNI)",
        "yyz.llm-gateway.truefoundry.com \u2022 trail.truefoundry.com \u2022  sin.llm-gateway.truefoundry.com",
        "truefoundry.com \u2022  assets.production.truefoundry.com \u2022 cpt.llm-gateway.truefoundry.com",
        "www.techcult.com",
        "scnrscnr pulse is good. I\u2019m assuming they\u2019re targets.",
        "http://pic.porn.hub-accessories.site \u2022 https://pic.porn.hub-accessories.site \u2022 pic.porn.hub-accessories.site",
        "https://www.mccormick-designs.com",
        "http://scteamcommunity.com/4k-high-res-porn-videos/squirt phishing",
        "Alerts: dynamic_function_loading  injection_write_process reads_memory_remote_process",
        "https://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com \u2022 www.techcult.com/judge-the-simpsons-parody-is-child-pornography/ Whitelisted domain techcult.com\t  Domain blogspot.com Whitelisted domain blogspot.com\t  Domain techcult.com Whitelisted domain techcult.com\t  Hostname aninditaannisa.blogspot.com \u2022 domain blogspot.com",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Alf:trojan:win32/cassini_56a3061!ibt",
            "Trojandownloader:win32/upatre.o",
            "Trojandownloader:win32/upatre",
            "Win32:malware-gen",
            "Phishing hsbc",
            "Win.trojan.zbot-64721",
            "Alf:heraklezeval:pua:win32/imali",
            "Win.ransomware.msilzilla-10014498-0",
            "Trojandropper:win32/vb.il0",
            "#lowfi:hstr:win32/airinstaller.b",
            "Ransom:win32/teerac.a",
            "Win.trojan",
            "Win.trojan.airinstall-1",
            "Artro",
            "Trojanspy:win32/nivdort",
            "Trojan:win32/neconyd.a",
            "Alf:jasyp:trojandownloader:win32/startpage!atmn",
            "Win.dropper.remcos-9970861-0",
            "Win.trojan.nsis-41",
            "Virtool:win32/injector.gen!bq",
            "Trojan/banker.androidos.bzd"
          ],
          "industries": [
            "Media"
          ],
          "unique_indicators": 44785
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/defendercameras.com",
    "whois": "http://whois.domaintools.com/defendercameras.com",
    "domain": "defendercameras.com",
    "hostname": "support.defendercameras.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 16,
  "pulses": [
    {
      "id": "6923408464566e39caf32285",
      "name": "Discord- DNS | Malvertizing | Ransom/Msilzilla (sifting IoC\u2019s created by scnrscnr)",
      "description": "TAGS\nActive\n443 ma2592000\nChristopher Pool\nPool's Closed\nTimothy Pool\na li\n google\namerica att\napache\napache ip\nasn as46606\nauditmode force\nbehavior\nbinary\nbinary file\nbk role\nchat\ncheck\nchrome\nck ids\ncommon stealer\ncookie\ndata upload\ndefender\ndelete c\ndirectui\ndiscord\ndns lookup\ndomain add\ndrop\ndynamicloader\neb d8\nee fc\nerror oct\nexplorer\nexternal ip\nextraction\nf0 ff\nfailed\nff bb\nff d5\nff ff\nfiles\nfoundry\ngmt content\ngmt etag\ngmt server\ngoogle chrome\nguard\nhigh\ninsert\nlolminer\nmalware\nmedia\nmeta\nmoved\nmovie\nmsie\nmsvisualbasic60\nmtb aug -present \nneversend\npowershell\nrelated nids\nresponse ip\nself\nservice domain\nsingapore\nsmartassembly\nspan\nspan a\nsx08x00x00a\ntargeting\ntls sni\ntrojan\ntrojandropper\ntwitter\ntx08x00x00n\nunique\nuser agent\nux08x00x00h\nvirtool\nvirustotal api\nvoice\nvx08x00x00j\nwrite\nwrite c\nwx08x00x00\nx08x00x00b\nx08x00x00x00\nyara\nyara rule\nyx08x00x00l\nz3je\nz3uwq7\nzx08x00x00",
      "modified": "2025-12-23T16:04:54.329000",
      "created": "2025-11-23T17:12:36.917000",
      "tags": [
        "no expiration",
        "expiration",
        "url https",
        "url http",
        "filehashsha256",
        "hostname",
        "domain",
        "filehashmd5",
        "filehashsha1",
        "ipv4",
        "code",
        "pool",
        "timothy pool",
        "z3je z3uwq7",
        "creation date",
        "ip address",
        "emails",
        "expiration date",
        "status",
        "hostname add",
        "pulse pulses",
        "passive dns",
        "urls",
        "date"
      ],
      "references": [
        "https://otx.alienvault.com/pulse/5fa57698ac0f6638b7b9a8ba",
        "Examining pulse created by scnrscnr is worth reviewing. I was surprised tonal see a targets name.I didn\u2019t see Foundry highlighted",
        "http://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com",
        "https://aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html \u2022 blogspot.com \u2022 www.techcult.com/judge-the-simpsons-parody-is-child-pornography/ Whitelisted domain techcult.com\t  Domain blogspot.com Whitelisted domain blogspot.com\t  Domain techcult.com Whitelisted domain techcult.com\t  Hostname aninditaannisa.blogspot.com \u2022 domain blogspot.com",
        "www.techcult.com",
        "http://foundry.tartarynova.com phishing \u2022  https://foundry.tartarynova.com \u2022 foundry.tartarynova.com",
        "https://trail.truefoundry.com/api/t/c/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE/enc_U2FsdGVkX1_wWHRx9nPGCEspZpUcIwc1yphMTxaaQ2ZAbsxOqRR4ibXcaYtcmgJ1UgabTFCHVVBLx2oAnBAW2h8el_edjHN72Ug0yKQePjKnSJEOnQvtq8MUPo0vkU1N",
        "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_L9bYYgL2HGng9mDsC",
        "https://trail.truefoundry.com/api/track/open/usr_NEDuPPvnqv5DXyhti/tsk_X2YECqnpAow7t6JuE",
        "truefoundry.com \u2022  assets.production.truefoundry.com \u2022 cpt.llm-gateway.truefoundry.com",
        "yyz.llm-gateway.truefoundry.com \u2022 trail.truefoundry.com \u2022  sin.llm-gateway.truefoundry.com",
        "lm-gateway.truefoundry.com \u2022 https://assets.production.truefoundry.com/sample-openapi.json",
        "162.159.128.233 \u2022 http://tsar.vicly.org \u2022 https://tsar.vicly.org \u2022 tsar.vicly.org \u2022 vicly.org \u2022 https://tsar.vicly.org/",
        "http://scteamcommunity.com/4k-high-res-porn-videos/squirt phishing",
        "http://pic.porn.hub-accessories.site \u2022 https://pic.porn.hub-accessories.site \u2022 pic.porn.hub-accessories.site",
        "2022ww11.pornhubgsy.com \u2022 http://scteamcommunity.com/4k-high-res-porn-videos/squirt",
        "IDS Detections: Observed Discord Domain in DNS Lookup (discord .com) Discord Chat Service Domain in DNS Lookup (discord .com)",
        "IDS Detections: Observed Discord Domain (discord .com in TLS SNI)",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "IDS Detections: Observed Discord Domain (discordapp .com in TLS SNI) Observed Discord Service Domain (discord .com) in TLS SNI Less",
        "Yara: Detections ConventionEngine_Term_Users",
        "Yara:  ConventionEngine_Anomaly_MultiPDB_Double ,  ConventionEngine_Term_Documents",
        "Alerts: infostealer_browser infostealer_cookies binary_yara procmem_yara static_pe_anomaly",
        "Alerts: pe_compile_timestomping antiav_detectfile antidebug_guardpages encrypted_ioc",
        "Alerts: dynamic_function_loading  injection_write_process reads_memory_remote_process",
        "Alerts : network_cnc_https_generic reads_self packer_entropy injection_rwx uses_windows_utilities antivm_checks_available_memory queries_computer_name queries_user_name",
        "Yara : MS_Visual_Basic_6_0 ,",
        "Yara : UPX , Nrv2x , UPX_OEP_place , UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser",
        "Alerts : ransomware_file_modifications stealth_file procmem_yara static_pe_anomaly",
        "Alerts: disables_folder_options stealth_hidden_extension stealth_hiddenreg anomalous_deletefile",
        "Alerts:  mouse_movement_detect",
        "Couldn\u2019t pulse 1st pulse so here\u2019s what\u2019s left",
        "scnrscnr pulse is good. I\u2019m assuming they\u2019re targets.",
        "Foundry stalking."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanDropper:Win32/VB.IL0",
          "display_name": "TrojanDropper:Win32/VB.IL0",
          "target": "/malware/TrojanDropper:Win32/VB.IL0"
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_56a3061!ibt",
          "display_name": "ALF:Trojan:Win32/Cassini_56a3061!ibt",
          "target": null
        },
        {
          "id": "Win.Ransomware.Msilzilla-10014498-0",
          "display_name": "Win.Ransomware.Msilzilla-10014498-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1443",
          "name": "Remotely Install Application",
          "display_name": "T1443 - Remotely Install Application"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 773,
        "FileHash-SHA1": 684,
        "FileHash-SHA256": 1910,
        "CVE": 2,
        "SSLCertFingerprint": 4,
        "URL": 3783,
        "domain": 878,
        "email": 7,
        "hostname": 1913
      },
      "indicator_count": 9954,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "118 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e77c7c488546842f94848c",
      "name": "Injection \u2022 FormBook",
      "description": "Insane",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-05T20:11:40.389000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 66,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "746 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e7832f3d5621ae81a5c4c2",
      "name": "Injection \u2022 FormBook ",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-05T20:40:15.678000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 63,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "746 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea63bd597387fdaccd36bd",
      "name": "Injection \u2022 FormBook",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-08T01:02:53.039000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 60,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "746 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eba0786d5bbd4f31a60c17",
      "name": "Injection \u2022 FormBook",
      "description": "",
      "modified": "2024-04-04T19:04:12.599000",
      "created": "2024-03-08T23:34:16.648000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "march",
        "historical ssl",
        "threat roundup",
        "contacted",
        "referrer",
        "resolutions",
        "siblings domain",
        "malicious",
        "malware",
        "metro",
        "whois whois",
        "hackers utilize",
        "contacted urls",
        "lowfi",
        "date hash",
        "avast avg",
        "msdefender feb",
        "vendor finding",
        "notes avast",
        "win32",
        "ms defender",
        "trojanspy",
        "files matching",
        "number",
        "sample analysis",
        "copy",
        "hide samples",
        "as133618",
        "trojan",
        "passive dns",
        "ransom",
        "entries",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "encrypt",
        "virtool",
        "body",
        "click",
        "date",
        "artro",
        "script urls",
        "asnone united",
        "unknown",
        "as2635",
        "united",
        "search",
        "showing",
        "title",
        "moved",
        "script domains",
        "bypass",
        "tools",
        "meta",
        "cookie",
        "next",
        "urls",
        "address",
        "creation date",
        "dnssec",
        "protect",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "xfbml1",
        "t1676916559",
        "ucddaocjgah",
        "rhttps",
        "hostname",
        "virgin islands",
        "cname",
        "as47846",
        "germany unknown",
        "as44273 host",
        "as45638",
        "pty ltd",
        "name servers",
        "hostnames",
        "urls https",
        "cryp",
        "bq apr",
        "servers",
        "pulse submit",
        "url analysis",
        "files",
        "ip address",
        "domain",
        "emails",
        "expiration date",
        "canada unknown",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "formbook cnc",
        "checkin",
        "cape",
        "formbook",
        "windows",
        "rc2i",
        "powershell",
        "write",
        "mccormick",
        "photos",
        "design og",
        "html info",
        "title works",
        "design meta",
        "tags og",
        "wordpress",
        "woocommerce",
        "design trackers",
        "status",
        "as131316 slnet",
        "as14061",
        "win32upatre mar",
        "win32imali mar",
        "injection",
        "http response",
        "final url",
        "serving ip",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "acceptencoding",
        "apache",
        "upgrade",
        "keepalive",
        "show",
        "pe32",
        "intel",
        "ms windows",
        "markus",
        "hallrender",
        "songculture attacked",
        "tsara brashears",
        "scott mccormick",
        "aurora",
        "colorado",
        "rexxfield",
        "m brian sabey",
        "rally",
        "analyze",
        "targeted",
        "nxdomain",
        "as397240",
        "as22612",
        "record value",
        "for privacy",
        "aaaa",
        "alienvault",
        "open threat",
        "hit",
        "men",
        "man",
        "reredrum",
        "monitoring"
      ],
      "references": [
        "https://www.mccormick-designs.com",
        "http://www.sheraises.com/wcur/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Botnet]",
        "72.167.124.187  [phishing]",
        "http://track.getportal.net/trackcnt/Kvg48RpSKKFNkW8e/?data=L4300109",
        "track.getportal.net \u2022 logs.getportal.net \u2022 morda.getportal.net",
        "http://em.onedirect.in/ls/click?upn=7RLF-2FDQ4RqYaRQtlnfvOgvQ66wDRlCqFovy2-2BXJwRBId7DR0PEPeiDPgFR0O6bb0FsljUHxEKK6C5a36-2FIswwfy8i49p0CmfV",
        "www.jamesbgriffinlaw.com (toolbox)",
        "http://www.kavyadigitalservices.com/wp-content/plugins/revslider/temp/update_extract/revslider/terms.php?id=3384758333",
        "nr-data.net [Apple Private Data Collection]",
        "applephonenw.com [governmentattic]",
        "device-local-3fea3945-5a69-47b5-9512-efa9e952b40e.remotewd.com",
        "https://r-login.wordpress.com/remote-login.php?wpcom_remote_login=key&origin=aHR0cHM6Ly9pbnRoZXBsb3R0aW5nc2hlZC5jb20%3D&wpcomid=113013957&time=1676916558",
        "jesusandcoffee.com [governmentattic.org] jajaja not funny freaks",
        "http://mcbut.live (Not present? Absent today - unexcused)",
        "thecomments.app"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Australia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Ransom:Win32/Teerac.A",
          "display_name": "Ransom:Win32/Teerac.A",
          "target": "/malware/Ransom:Win32/Teerac.A"
        },
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.O",
          "display_name": "TrojanDownloader:Win32/Upatre.O",
          "target": "/malware/TrojanDownloader:Win32/Upatre.O"
        },
        {
          "id": "TrojanDownloader:Win32/Upatre",
          "display_name": "TrojanDownloader:Win32/Upatre",
          "target": "/malware/TrojanDownloader:Win32/Upatre"
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/Startpage!atmn",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "display_name": "#Lowfi:HSTR:Win32/AirInstaller.B",
          "target": null
        },
        {
          "id": "Win.Trojan",
          "display_name": "Win.Trojan",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-64721",
          "display_name": "Win.Trojan.Zbot-64721",
          "target": null
        },
        {
          "id": "Win.Dropper.Remcos-9970861-0",
          "display_name": "Win.Dropper.Remcos-9970861-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/Imali",
          "display_name": "ALF:HeraklezEval:PUA:Win32/Imali",
          "target": null
        },
        {
          "id": "Win.Trojan.NSIS-41",
          "display_name": "Win.Trojan.NSIS-41",
          "target": null
        },
        {
          "id": "Win.Trojan.Airinstall-1",
          "display_name": "Win.Trojan.Airinstall-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1547.006",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1547.006 - Kernel Modules and Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e77c7c488546842f94848c",
      "export_count": 62,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4708,
        "hostname": 1810,
        "FileHash-MD5": 254,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1631,
        "domain": 2741,
        "CVE": 3,
        "email": 11
      },
      "indicator_count": 11371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "746 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bbca54daebb7d2084f350d",
      "name": "Phishing HSBC (identity theft) -  Hijack Execution Flow",
      "description": "Hijack Execution Flow: Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.\n\nThere are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.",
      "modified": "2024-03-02T16:00:27.416000",
      "created": "2024-02-01T16:44:04.317000",
      "tags": [
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist http",
        "hsbc group",
        "phishtank http",
        "phishing hsbc",
        "traffic",
        "tor exit",
        "exit",
        "node tcp",
        "et tor",
        "known tor",
        "tor known",
        "http spammer",
        "node",
        "spammer",
        "malicious",
        "malware",
        "team",
        "download",
        "http response",
        "final url",
        "xamzexpires600",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers",
        "algorithm",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "server",
        "registrar abuse",
        "iana id",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "llc registry",
        "expiry date",
        "date",
        "dns replication",
        "basic",
        "pe32 executable",
        "ms windows",
        "intel",
        "win32 dynamic",
        "link library",
        "os2 executable",
        "clipper dos",
        "executable",
        "pe32",
        "win16 ne",
        "pe32 installer",
        "mitre"
      ],
      "references": [
        "http://www.tripphouse.com/th_ext.php",
        "www.tripphouse.com",
        "https://attack.mitre.org/techniques/T1574/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Phishing HSBC",
          "display_name": "Phishing HSBC",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2190,
        "FileHash-SHA1": 244,
        "FileHash-SHA256": 775,
        "URL": 2229,
        "domain": 545,
        "hostname": 723,
        "CVE": 1,
        "email": 2
      },
      "indicator_count": 6709,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "779 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a67da62bb520508659a5",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:51:09.511000",
      "created": "2023-12-06T16:51:09.511000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a67567202b93ee502ff7",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:51:00.527000",
      "created": "2023-12-06T16:51:00.527000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a66d9992e6957b2d1415",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:50:53.855000",
      "created": "2023-12-06T16:50:53.855000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a667be1f5233855ae115",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:50:47.344000",
      "created": "2023-12-06T16:50:47.344000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://support.defendercameras.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://support.defendercameras.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776716138.8003008
}