{
  "type": "URL",
  "indicator": "https://svr3.virusshare.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://svr3.virusshare.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3956490092,
      "indicator": "https://svr3.virusshare.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "6962b68da732abc66a0c2caf",
          "name": "Der Zugriff \u2022 Kanna \u2022 MyDoom \u2022 Sigur - Pahamify Pegasus",
          "description": "Pahamify Pegasus | Execution Attack, Access Attack | Drive by Compromise | \nSifting through Pahamify Pegasus this is no longer your computer , injection, google connects, remote connections, remote mouse movement, remote access, Google espionage, bad traffic, Apple complicit access. This is your Google account and browser, this is your appleid. Still researching\u2026. || \n*https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_ ||\nMalware: Der Zugriff ,\nKanna ,\nMyDoom ,\nSigur \n#firebase #google_connection #bible_gateway_honeypot #crypto #hidden_users #who_else",
          "modified": "2026-02-09T19:00:09.890000",
          "created": "2026-01-10T20:29:01.675000",
          "tags": [
            "ip address",
            "status code",
            "kb body",
            "iocs",
            "deny age",
            "cloudfront",
            "utc google",
            "tag manager",
            "g8t6ln06z40",
            "utc na",
            "google tag",
            "injection",
            "t1055 malware",
            "tree",
            "help v",
            "defense evasion",
            "injection t1055",
            "resolved ips",
            "get http",
            "dns resolutions",
            "v memory",
            "pattern domains",
            "full reports",
            "v help",
            "memory pattern",
            "urls https",
            "hashes",
            "tiktok",
            "microsoft",
            "dashboard falcon",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "appleid",
            "united",
            "name servers",
            "aaaa",
            "servers",
            "moved",
            "script urls",
            "passive dns",
            "urls",
            "data upload",
            "extraction",
            "failed",
            "jsvendor",
            "jsapp",
            "script script",
            "cssapp",
            "jsfirebase",
            "pegasus",
            "encrypt",
            "title error",
            "ipv4",
            "files",
            "reverse dns",
            "united states",
            "malware",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "execution att",
            "t1204 user",
            "script",
            "beginstring",
            "bad traffic",
            "et info",
            "null",
            "title",
            "refresh",
            "span",
            "strings",
            "error",
            "tools",
            "meta",
            "look",
            "verify",
            "restart",
            "mitre att",
            "ascii text",
            "pattern match",
            "ck matrix",
            "tls handshake",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "ck techniques",
            "access att",
            "div div",
            "a li",
            "ul div",
            "record value",
            "emails",
            "accept",
            "referen https",
            "microsoft-falcon.net",
            "proxy",
            "status",
            "certificate",
            "updated date",
            "whois server",
            "zipcode",
            "entries http",
            "scans show",
            "search",
            "matches x",
            "type",
            "gmt cache",
            "all ipv4",
            "america flag",
            "america asn",
            "sameorigin",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jan",
            "ipv4 add",
            "win32mydoom jan",
            "trojan",
            "worm",
            "expiration date",
            "files show",
            "date hash",
            "avast avg",
            "win32mydoom",
            "backdoor",
            "found",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "dynamicloader",
            "medium",
            "high",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "write",
            "global",
            "domain name",
            "hostname",
            "apple",
            "racebook",
            "mouse movement",
            "remote mouse",
            "domain",
            "hostname add",
            "url analysis",
            "crlf line",
            "ff d5",
            "unicode text",
            "utf8",
            "ee fc",
            "yara rule",
            "f0 ff",
            "ff bb",
            "music",
            "push",
            "autorun",
            "unknown",
            "present sep",
            "present may",
            "present jan",
            "present aug",
            "cname",
            "present nov",
            "present jun",
            "apache",
            "body",
            "pragma",
            "found registry",
            "able",
            "model",
            "indicator",
            "source",
            "show technique",
            "file",
            "internet",
            "errore",
            "erreur",
            "download",
            "service",
            "crypto",
            "compiler",
            "installer",
            "yang",
            "updater",
            "shutdown",
            "thunk",
            "este",
            "install",
            "reboot",
            "code",
            "downloader",
            "sigur",
            "kanna",
            "der zugriff",
            "google",
            "chrome",
            "Pahamify Pegasus",
            "christoper p. ahmann",
            "law enforcement",
            "retaliation",
            "phone",
            "espionage",
            "united states",
            "m brian sabey",
            "quasi government",
            "target",
            "monitored targeting",
            "aig",
            "therahand (old name)",
            "target: tsara brashears",
            "douglas county, co",
            "sheriff",
            "industry and commerce",
            "worker\u2019s compensation",
            "crime",
            "financial crime",
            "danger",
            "nem tih",
            "amazon",
            "aws",
            "amazon aws",
            "deal",
            "deal with it lawfully",
            "pay victim",
            "protecting reimer"
          ],
          "references": [
            "https://pegasus.pahamify.com/ \u2022 pahamify.com \u2022 pegasus.pahamify.com \u2022 activation.pahamify.com \u2022 httpspegasus.pahamify.com",
            "https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_",
            "Der Zugriff\u2022 Kanna \u2022 MyDoom \u2022 Sigur",
            "Pahamify Pegasus",
            "Matches rule ET INFO Observed Google DNS over HTTPS Domain (dns google in TLS SNI)",
            "https://graph.facebook.com/v3.3/590584968016991/mobile_sdk_gk?fields=gatekeepers&format=json&sdk_version=5.0.0&sdk=android&platform=android",
            "https://4.base.maps.ls.hereapi.com/maptile/2.1/maptile/newest/normal.day.mobile/{z}/{x}/{y}/256/PNG8?apiKey=wzEuHW02YdaEjU0Em-SwWQBtxbfF86-OfUuq1z93NI4",
            "tv.apple.com",
            "dashboard-proxy-sc-ncus-j7ynx.falcon- core.microsoft-falcon.net",
            "Antivirus Detections: Win.Trojan.Gamarue-9832405-0 ,  Trojan:Win32/Pariham.A",
            "IDS : Commonly Abused File Sharing Site Domain Observed (sendspace .com in DNS Lookup)",
            "IDS: Commonly Abused File Sharing Site Domain Observed (sendspace .com in TLS SNI)",
            "IDS: TLS Handshake Failure",
            "Yara Detections BackdoorWin32Simda",
            "Google_Chrome_64bit_v136.0.7103.49.exe",
            "https://hybrid-analysis.com/sample/e4306740e79c65c90242aef93fceeb93fa6da74577570c7b4a04399879349c37/696298b7667c4a112d04eac7",
            "https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 wallpapers-nature.com",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io \u2022",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            },
            {
              "id": "Virus:Win95/Cerebrus",
              "display_name": "Virus:Win95/Cerebrus",
              "target": "/malware/Virus:Win95/Cerebrus"
            },
            {
              "id": "AutoRunIt",
              "display_name": "AutoRunIt",
              "target": null
            },
            {
              "id": "Sigur",
              "display_name": "Sigur",
              "target": null
            },
            {
              "id": "Kanna",
              "display_name": "Kanna",
              "target": null
            },
            {
              "id": "Der Zugriff",
              "display_name": "Der Zugriff",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1124",
              "name": "System Time Discovery",
              "display_name": "T1124 - System Time Discovery"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1213",
              "name": "Data from Information Repositories",
              "display_name": "T1213 - Data from Information Repositories"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1529",
              "name": "System Shutdown/Reboot",
              "display_name": "T1529 - System Shutdown/Reboot"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1559",
              "name": "Inter-Process Communication",
              "display_name": "T1559 - Inter-Process Communication"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1570",
              "name": "Lateral Tool Transfer",
              "display_name": "T1570 - Lateral Tool Transfer"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1569.002",
              "name": "Service Execution",
              "display_name": "T1569.002 - Service Execution"
            },
            {
              "id": "T1543.003",
              "name": "Windows Service",
              "display_name": "T1543.003 - Windows Service"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1055.003",
              "name": "Thread Execution Hijacking",
              "display_name": "T1055.003 - Thread Execution Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1134.002",
              "name": "Create Process with Token",
              "display_name": "T1134.002 - Create Process with Token"
            },
            {
              "id": "T1070.006",
              "name": "Timestomp",
              "display_name": "T1070.006 - Timestomp"
            },
            {
              "id": "T1564.003",
              "name": "Hidden Window",
              "display_name": "T1564.003 - Hidden Window"
            },
            {
              "id": "T1497.003",
              "name": "Time Based Evasion",
              "display_name": "T1497.003 - Time Based Evasion"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1074.001",
              "name": "Local Data Staging",
              "display_name": "T1074.001 - Local Data Staging"
            },
            {
              "id": "T1560.002",
              "name": "Archive via Library",
              "display_name": "T1560.002 - Archive via Library"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            }
          ],
          "industries": [
            "Civil Society",
            "Legal",
            "Government",
            "Technology",
            "Telecommunications",
            "Financial"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6094,
            "domain": 1195,
            "hostname": 2001,
            "FileHash-SHA256": 2598,
            "FileHash-MD5": 546,
            "FileHash-SHA1": 403,
            "email": 16,
            "CVE": 2,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 12858,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "70 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692cb6dc24da17618e3d9da6",
          "name": "Mirai Botnet | HackTool Powershell targets LinkedIn User | 192.168.1.1 \u2022  Remote Inbound Outbound Connection",
          "description": "Linux Malware - LinkedIn- True  Mirai Botnet  (192.168.1.1) (Never Connect) Incredibly powerful attack targeting LinkedIn users. In this instance the target is an ex husband of a target. |\nNDO Group relationships seen. This is a Botnet. \n\nMay be \u2018framing\u2019 attack that was launched in 2014. Attackers sent a clear message to target that she + husband would be arrested and charged with possession of 1000\u2019s of \u2018child pornography\u2019  pictures. \n\nAttack 10/10 malicious. Worked from separate system in separate location. Hackers unlocked a device,  zero clicks, removed PSW. Tulach malware seen a profile \u2018Michael Robert\u2019s of Rexxfield\u2019 may be  entity (NSA) with a face like Tulach. Uses the most WILD compromises. Government contractors? \n\nSame attackers  brought down Prudentials \u2018Assurance\u2019 Medicare system forever.\n  ESET hackers only allowing \u2018bad traffic\u2019 .",
          "modified": "2025-12-30T19:04:40.430000",
          "created": "2025-11-30T21:27:56.239000",
          "tags": [
            "enter",
            "extract",
            "enter source",
            "urls",
            "address",
            "remote connect",
            "private ip",
            "sql",
            "inject",
            "montserrat",
            "script urls",
            "germany unknown",
            "xml title",
            "wiesinger",
            "style",
            "ip address",
            "script domains",
            "body doctype",
            "encrypt",
            "botnet",
            "dropper",
            "unix",
            "resolverror",
            "et exploit",
            "outbound",
            "mirai variant",
            "useragent",
            "inbound",
            "et trojan",
            "et webserver",
            "scan mirai",
            "hello",
            "execution",
            "mirai",
            "malware",
            "shell",
            "nids",
            "ids detections",
            "wget command",
            "http headers",
            "dlink devices",
            "home network",
            "mvpower dvr",
            "shell uce",
            "mirai elf",
            "linux malware",
            "is__elf",
            "cnc",
            "meta http",
            "content",
            "gmt server",
            "files",
            "reverse dns",
            "germany",
            "ismaning",
            "germany asn",
            "as5539 spacenet",
            "germany https",
            "auto generated security (?)",
            "redacted for",
            "name servers",
            "aaaa",
            "search",
            "for privacy",
            "title",
            "intel",
            "ms windows",
            "pe32",
            "process32nextw",
            "write c",
            "mssql port",
            "hash",
            "beapy",
            "bit32bit",
            "agent",
            "write",
            "hacktool",
            "win32",
            "next",
            "suspicious user",
            "pybeapy cnc",
            "checkin",
            "w32beapy cnc",
            "beacon",
            "module load",
            "external ip",
            "lookup",
            "home assistant",
            "intptr",
            "uint32",
            "type",
            "parameter",
            "oldprotectflag",
            "mandatory",
            "throw",
            "position",
            "lkshkdandl",
            "success",
            "info",
            "powershell",
            "null",
            "error",
            "date hash",
            "next yara",
            "detections name",
            "medium",
            "graph tree",
            "sample",
            "sample hash",
            "exec bypass",
            "c ipconfig",
            "world",
            "jaws webserver",
            "chmod usage",
            "strings",
            "extraction",
            "data upload",
            "extre",
            "include data",
            "hos hos",
            "y se",
            "sugges",
            "find s",
            "typ hos",
            "hos data",
            "hos hostname",
            "hos host",
            "extr data",
            "tethering",
            "tulach",
            "114.114.114.114",
            "passive dns",
            "pulse pulses",
            "http",
            "related nids",
            "files location",
            "united",
            "flag united",
            "files domain",
            "next associated",
            "ipv4 add",
            "delphi",
            "read c",
            "packing t1045",
            "t1045",
            "worm",
            "code",
            "june",
            "irc nick command",
            "irc",
            "meta",
            "status",
            "record value",
            "unknown aaaa",
            "expiration",
            "url http",
            "indicator role",
            "pulses url",
            "no expiration",
            "url https",
            "url url",
            "o url",
            "request review",
            "hosting",
            "unknown",
            "medium security",
            "extra data",
            "failed",
            "linkedin",
            "url add",
            "ireland flag",
            "ireland",
            "dublin",
            "ireland asn",
            "as16509",
            "spyware",
            "nso",
            "nso group",
            "pegasus related",
            "nso related",
            "framing",
            "porn",
            "python",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "apple",
            "192.168.1.1",
            "law",
            "attorney"
          ],
          "references": [
            "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
            "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
            "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
            "Mirai Botnet - *Inbound & Outbound connection",
            "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
            "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
            "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
            "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)",
            "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
            "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
            "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
            "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
            "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
            "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
            "https://frostty12ice.info/ \u2022 https://lawhubh.info",
            "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Botnet-6566040-0",
              "display_name": "Unix.Dropper.Botnet-6566040-0",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Montserrat",
              "display_name": "Montserrat",
              "target": null
            },
            {
              "id": "Beapy",
              "display_name": "Beapy",
              "target": null
            },
            {
              "id": "HackTool:Win32/PowerSploit!rfn",
              "display_name": "HackTool:Win32/PowerSploit!rfn",
              "target": "/malware/HackTool:Win32/PowerSploit!rfn"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom.PB!MTB",
              "display_name": "Worm:Win32/Mydoom.PB!MTB",
              "target": "/malware/Worm:Win32/Mydoom.PB!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "TA0036",
              "name": "Exfiltration",
              "display_name": "TA0036 - Exfiltration"
            },
            {
              "id": "TA0039",
              "name": "Remote Service Effects",
              "display_name": "TA0039 - Remote Service Effects"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1019",
              "name": "System Firmware",
              "display_name": "T1019 - System Firmware"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553.001",
              "name": "Gatekeeper Bypass",
              "display_name": "T1553.001 - Gatekeeper Bypass"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1609",
              "name": "Container Administration Command",
              "display_name": "T1609 - Container Administration Command"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            }
          ],
          "industries": [
            "Government",
            "Legal",
            "Healthcare",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4147,
            "domain": 871,
            "hostname": 2194,
            "FileHash-MD5": 279,
            "FileHash-SHA1": 257,
            "FileHash-SHA256": 2183,
            "CVE": 6,
            "email": 3,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 9941,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "111 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6920c43c3772bb24f26f70cc",
          "name": "Xred_Malware \u2022 Dark Comet \u2022 Darkgate \u2022 Elex \u2022 Glassworm | AutoRun",
          "description": "Attack originates from government contractors/ quasi governmental entities. Criminal Defense and Government contracted Law firms commonly abuse these tactics. Targeting. Found in data of a target. Focused on (1) FILE HASH and (1)  IP address .[referenced] *XRed _Mal\n* EXE Infection | OTX  auto populated - Adversaries may be able to gain access to victim systems using a variety of techniques to evade detection and conceal their actions. and their intentions, as well as using other techniques, to avoid detection.",
          "modified": "2025-12-21T18:01:07.268000",
          "created": "2025-11-21T19:57:48.145000",
          "tags": [
            "dynamicloader",
            "write c",
            "write",
            "high",
            "yara rule",
            "myapp",
            "delphi",
            "worm",
            "win32",
            "error",
            "code",
            "malware",
            "defender",
            "medium",
            "binary file",
            "heavensgate",
            "bochs",
            "dynamic",
            "td td",
            "td tr",
            "united",
            "a td",
            "a domains",
            "dynamic dns",
            "static dns",
            "dd wrt",
            "twitter",
            "trojan",
            "trojandropper",
            "null",
            "enough",
            "simple",
            "click",
            "easy",
            "premium",
            "associated urls",
            "server response",
            "google safe",
            "results nov",
            "avast avg",
            "11.21.2025",
            "11.20.2025",
            "borland delphi",
            "pe32",
            "intel",
            "ms windows",
            "inno setup",
            "win32 exe",
            "pecompact",
            "delphi generic",
            "pe32 compiler",
            "dark comet",
            "dark gate",
            "glassworm",
            "md5 code",
            "data",
            "porkbun llc",
            "windows match",
            "getprocaddress",
            "peb idrdata",
            "match peb",
            "t1547",
            "t1059 t1112",
            "shared modules",
            "t1129",
            "boot",
            "logon autostart",
            "execu",
            "t1134 boot",
            "encoding",
            "capture e1113",
            "file attributes",
            "analysis ob0001",
            "b0001 software",
            "virtual machine",
            "detection b0009",
            "analysis ob0002",
            "ob0003 screen",
            "windows get",
            "check",
            "encode",
            "check internet",
            "wininet set",
            "clear file",
            "enumerate gui",
            "get hostname",
            "get keyboard",
            "set registry",
            "find",
            "capture",
            "url http",
            "consolefoundry",
            "console foundry",
            "foundry",
            "malware catalog tree",
            "autorun keys",
            "modification",
            "alexander karp",
            "peter theil",
            "christoper ahmann",
            "christopher pool",
            "mercedes",
            "apple",
            "palantir",
            "adversarial",
            "adversaries",
            "hostile",
            "quasi",
            "empty hash",
            "denver",
            "mal_xred_backdoor",
            "backdoor",
            "xred",
            "brian sabey",
            "first-send-petikvx",
            "stop",
            "glassworm",
            "elex",
            "darkgate",
            "dark-comet",
            "search",
            "entries",
            "show",
            "yara detections",
            "icmp traffic",
            "rtf file",
            "top source",
            "top destination",
            "format",
            "host",
            "copy",
            "next",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "found",
            "access att",
            "font",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "sha256",
            "mitre att",
            "title",
            "meta",
            "hybrid",
            "local",
            "path",
            "strings",
            "body",
            "contact",
            "trace",
            "form",
            "bitcoin",
            "core",
            "jeffrey reimer",
            "exe infection",
            "cve",
            "porn"
          ],
          "references": [
            "FILEHASH-SHA256 d0ce79b3e0f4798423871dd66c14172b1a0eac34131c1b92d210a7b5c31a8aa0",
            "Name 2025-11-19_b627882129bf281be5a3df318fff678b_dark-comet_darkgate_elex_glassworm_stop",
            "Antivirus Detection: Worm:Win32/AutoRun!atmn [Win.Trojan.Emotet relationship]",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara : Zeppelin_30 ,  compromised_site_redirector_fromcharcode ,",
            "Yara : BobSoft Mini Delphi -> BoB / BobSoft , Delphi",
            "Alerts : suspicious_iocontrol_codes process_creation_suspicious_location network_dyndns",
            "Alerts: multiple_useragents persistence_autorun binary_yara procmem_yara suricata_alert",
            "Alerts: antivm_bochs_keys antivm_generic_disk enumerates_physical_drives  antisandbox_sleep",
            "Alerts: physical_drive_access mouse_movement_detect dynamic_function_loading",
            "Alerts: http_request resumethread_remote_process antianalysis_tls_section network_httpn",
            "Alerts: packer_unknown",
            "Malicious IP Contacted: 69.42.215.252",
            "Abused Domains Contacted: xred.mooo.com freedns.afraid.org",
            "IP 69.42.215.252: http://nginx.com/ \u2022nginx.com\t\u2022 http://nginx.org/ \u2022 nginx.org \u2022 afraid.org \u2022 afraid.org",
            "IP 69.42.215.252: nginx.com\u2022 vb.cu \u2022 vb.il \u2022 yourdomain.com \u2022 yourdomain.com",
            "IP 69.42.215.252: theirname.yourdomain.com \u2022 www.freebsd.org freebsd.org \u2022 your.domain.com",
            "Windows Match api: GetProcAddress fs access  *access PEB Idr_data Match PEB access fs access",
            "consolefoundry.date \u2022 http://consolefoundry.date \u2022 http://consolefoundry",
            "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification -  Credits (split) below",
            "by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "http://freedns.afraid.org/images/apple.gif",
            "https://www.nextron-systems.com/notes-on-virustotal-matches/",
            "https://www.mumuplayer.com/redirect/customerservice/_wig",
            "https://www.mumuplayer.com/redirect/customerservice/fB)y",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ \u2022 http://www.anyxxxtube/",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t| Truth",
            "https://www.semena.cz/exoticke-okrasne/78-plumerie-havajska-kvetina-semena-3-ks.html",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "http://consolefoundry.date/one/gate.php",
            "https://hybrid-analysis.com/sample/ba5890ad431b894b0dfd6c9d3f3d6cbd7fedae1bd5a51483f54b22ba0209e3b8/6920be8a548209db740dd354"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453",
              "display_name": "Win.Trojan.Emotet-9850453",
              "target": null
            },
            {
              "id": "Win.Trojan.BlackNetRAT-7838854-0",
              "display_name": "Win.Trojan.BlackNetRAT-7838854-0",
              "target": null
            },
            {
              "id": "Win.Dropper.Nanocore-10021490-0",
              "display_name": "Win.Dropper.Nanocore-10021490-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Packed.Remcos-10024510-0",
              "display_name": "Win.Packed.Remcos-10024510-0",
              "target": null
            },
            {
              "id": "Code Overlap",
              "display_name": "Code Overlap",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "PSW:Win32/VB.CU",
              "display_name": "PSW:Win32/VB.CU",
              "target": "/malware/PSW:Win32/VB.CU"
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1541",
              "name": "Foreground Persistence",
              "display_name": "T1541 - Foreground Persistence"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1078.004",
              "name": "Cloud Accounts",
              "display_name": "T1078.004 - Cloud Accounts"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 460,
            "FileHash-SHA1": 437,
            "FileHash-SHA256": 4483,
            "SSLCertFingerprint": 2,
            "URL": 6487,
            "hostname": 1772,
            "domain": 652,
            "CVE": 3,
            "email": 5
          },
          "indicator_count": 14301,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68dc624893ea922b898f911b",
          "name": "FBI? Ghe real one? Idk - Cab / Deive by compromised an iOS device",
          "description": "Checking a targets phone, it\u2019s seems very infected with limited results on google searches results. I clicked on an image I thought looked suspicious. Image was coded. I have no idea if this is the FBI I haven\u2019t examined or researched for vulnerabilities yet. I will break this down over time. The number is kept alive but number could not be verified , it was a different number altogether. The phone was out of service, I reached out to 911. And spoke to a person I can\u2019t verify. The service was reconnected a day later. It\u2019s a very crazy hack!",
          "modified": "2025-10-30T22:01:00.256000",
          "created": "2025-09-30T23:05:44.154000",
          "tags": [
            "search",
            "google search",
            "in a",
            "relevance",
            "internet storm",
            "intranet",
            "part",
            "steps",
            "hyper v",
            "windowssystem32",
            "ping request",
            "algorithm",
            "ouno sni",
            "key usage",
            "google llc",
            "v3 serial",
            "number",
            "public key",
            "info",
            "key algorithm",
            "domain",
            "subject key",
            "identifier",
            "net173",
            "net1730000",
            "gogl",
            "orgid",
            "gogl address",
            "city",
            "mountain view",
            "stateprov",
            "postalcode",
            "registrar",
            "ip address",
            "http",
            "port",
            "accept",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "shutdown",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "defense evasion",
            "spawns",
            "found",
            "united",
            "ascii text",
            "pattern match",
            "mitre att",
            "title",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "body",
            "initial access",
            "local",
            "passive dns",
            "urls",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "backdoor",
            "status",
            "aaaa",
            "date",
            "name servers",
            "record value",
            "emails",
            "present aug",
            "present sep",
            "moved",
            "error",
            "antivm",
            "drive by",
            "cab by"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 544,
            "FileHash-SHA256": 2300,
            "URL": 3905,
            "hostname": 1675,
            "FileHash-MD5": 209,
            "FileHash-SHA1": 210,
            "CIDR": 1,
            "email": 7,
            "SSLCertFingerprint": 8,
            "CVE": 2
          },
          "indicator_count": 8861,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "172 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "676493c5607a603f1785a935",
          "name": "https://ginko.garden/pl/contact tel:+48 797 920 339  ip4 77.79.221.180   77.79.221.148",
          "description": "Pasywna replikacja DNS: \n77.79.221.180  \nSugerowany opis:\nPe\u0142ny tekst Ginko.Garden - Nowoczesne dekoracje i pergole metalowe - wedi dweud eu glass - metaloplastyka.\nSugerowane identyfikatory ATT&CK:\nOgr\u00f3d - Nowoczesne dekoracje z metalu do ogrodu - bi\u017cuteria ogrodowa i dekoracje szklane - pergole metalowe - metaloplastyka Meta Tagi s\u0142owa kluczowe Nowoczesne dekoracje z metalu do ogrodu - pergole metalowe - Ginko.\n77.79.221.148  \n46.41.159.227  \n46.41.159.177",
          "modified": "2025-07-28T11:51:42.400000",
          "created": "2024-12-19T21:44:37.537000",
          "tags": [
            "copyright",
            "customevent",
            "typeof e",
            "boomerang",
            "typeof t",
            "macintosh",
            "os x",
            "post",
            "typeof",
            "iframe",
            "date",
            "nazwa rekordu",
            "aaaaa",
            "na wniosek",
            "bezpieczestwo",
            "serwer",
            "przerwa",
            "informacja o",
            "prace",
            "nazwa",
            "hasze",
            "adresy url",
            "nazwa http",
            "configoverride",
            "continuity",
            "pageparam s",
            "iframedelay",
            "autoxhr",
            "historia",
            "nazwa https",
            "uytkownik",
            "zenbox",
            "komunikacja",
            "pliki",
            "rozmiar",
            "kb data",
            "wykrycia nie",
            "mitre",
            "ids nie",
            "sigmy nie",
            "submission",
            "sha256",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "unicode text",
            "utf8 text",
            "trid hypertext",
            "markup language"
          ],
          "references": [
            "https://s.go-mpulse.net/boomerang/XZ4AH-ABKPW-SQPBC-CYWES-BCG6V",
            "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=7a025cc6-5167-43cf-947f-387a3b830778",
            "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=f3ee4c4e-e009-4d69-82da-eef3bad1ecc4"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1334,
            "hostname": 454,
            "domain": 346,
            "IPv6": 2,
            "IPv4": 36,
            "FileHash-SHA256": 1499,
            "FileHash-MD5": 92,
            "FileHash-SHA1": 74,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 3839,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "266 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6841039ff61dea1fcdcc53c1",
          "name": "Malicious WiFi Internet network | trojan.morstar/bundler",
          "description": "WiFi / Internet provider \nConcerning- targeting?\nhttp://www.dead-speak.com/PsychicMediums.htm | \nhttp://www.dead-speak.com/PsychicMediums.html |\nwww.dead-speak.com || https://pin.it/ | \nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian |\npin.it |",
          "modified": "2025-07-05T02:01:54.546000",
          "created": "2025-06-05T02:40:31.779000",
          "tags": [
            "win32 exe",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "get http",
            "post http",
            "dns resolutions",
            "resolved ips",
            "symantec time",
            "stamping",
            "from",
            "algorithm",
            "thumbprint",
            "thumbprint md5",
            "signer",
            "g2 issuer",
            "ca valid",
            "serial number",
            "time stamping",
            "g4 issuer",
            "g2 valid",
            "usage ff",
            "code signing",
            "issuer certum",
            "certum code",
            "signing ca",
            "trusted network",
            "e5 e5",
            "d4 portable",
            "sha256",
            "overlay",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "catalog tree",
            "anti",
            "ob0001",
            "analysis ob0002",
            "control ob0004",
            "ob0007 impact",
            "ob0012 file",
            "system oc0001",
            "memory oc0002",
            "data oc0004"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 156,
            "FileHash-SHA1": 139,
            "FileHash-SHA256": 3313,
            "URL": 1223,
            "domain": 186,
            "hostname": 313
          },
          "indicator_count": 5332,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "289 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=f3ee4c4e-e009-4d69-82da-eef3bad1ecc4",
        "Antivirus Detections: Win.Trojan.Gamarue-9832405-0 ,  Trojan:Win32/Pariham.A",
        "IDS : Commonly Abused File Sharing Site Domain Observed (sendspace .com in DNS Lookup)",
        "http://freedns.afraid.org/images/apple.gif",
        "Der Zugriff\u2022 Kanna \u2022 MyDoom \u2022 Sigur",
        "dashboard-proxy-sc-ncus-j7ynx.falcon- core.microsoft-falcon.net",
        "Alerts: http_request resumethread_remote_process antianalysis_tls_section network_httpn",
        "Google_Chrome_64bit_v136.0.7103.49.exe",
        "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
        "IDS: Commonly Abused File Sharing Site Domain Observed (sendspace .com in TLS SNI)",
        "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
        "Alerts: multiple_useragents persistence_autorun binary_yara procmem_yara suricata_alert",
        "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
        "Name 2025-11-19_b627882129bf281be5a3df318fff678b_dark-comet_darkgate_elex_glassworm_stop",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "https://www.mumuplayer.com/redirect/customerservice/_wig",
        "Pahamify Pegasus",
        "https://hybrid-analysis.com/sample/ba5890ad431b894b0dfd6c9d3f3d6cbd7fedae1bd5a51483f54b22ba0209e3b8/6920be8a548209db740dd354",
        "Windows Match api: GetProcAddress fs access  *access PEB Idr_data Match PEB access fs access",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io \u2022",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pegasus.pahamify.com/ \u2022 pahamify.com \u2022 pegasus.pahamify.com \u2022 activation.pahamify.com \u2022 httpspegasus.pahamify.com",
        "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 wallpapers-nature.com",
        "https://graph.facebook.com/v3.3/590584968016991/mobile_sdk_gk?fields=gatekeepers&format=json&sdk_version=5.0.0&sdk=android&platform=android",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
        "Yara Detections BackdoorWin32Simda",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t| Truth",
        "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
        "Alerts : suspicious_iocontrol_codes process_creation_suspicious_location network_dyndns",
        "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
        "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification -  Credits (split) below",
        "https://frostty12ice.info/ \u2022 https://lawhubh.info",
        "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=7a025cc6-5167-43cf-947f-387a3b830778",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ \u2022 http://www.anyxxxtube/",
        "IP 69.42.215.252: http://nginx.com/ \u2022nginx.com\t\u2022 http://nginx.org/ \u2022 nginx.org \u2022 afraid.org \u2022 afraid.org",
        "Malicious IP Contacted: 69.42.215.252",
        "https://hybrid-analysis.com/sample/e4306740e79c65c90242aef93fceeb93fa6da74577570c7b4a04399879349c37/696298b7667c4a112d04eac7",
        "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
        "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "Mirai Botnet - *Inbound & Outbound connection",
        "https://www.mumuplayer.com/redirect/customerservice/fB)y",
        "https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_",
        "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Antivirus Detection: Worm:Win32/AutoRun!atmn [Win.Trojan.Emotet relationship]",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "Alerts: antivm_bochs_keys antivm_generic_disk enumerates_physical_drives  antisandbox_sleep",
        "FILEHASH-SHA256 d0ce79b3e0f4798423871dd66c14172b1a0eac34131c1b92d210a7b5c31a8aa0",
        "IP 69.42.215.252: theirname.yourdomain.com \u2022 www.freebsd.org freebsd.org \u2022 your.domain.com",
        "consolefoundry.date \u2022 http://consolefoundry.date \u2022 http://consolefoundry",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)",
        "https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "https://s.go-mpulse.net/boomerang/XZ4AH-ABKPW-SQPBC-CYWES-BCG6V",
        "Yara : Zeppelin_30 ,  compromised_site_redirector_fromcharcode ,",
        "IDS: TLS Handshake Failure",
        "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Matches rule ET INFO Observed Google DNS over HTTPS Domain (dns google in TLS SNI)",
        "Yara : BobSoft Mini Delphi -> BoB / BobSoft , Delphi",
        "Abused Domains Contacted: xred.mooo.com freedns.afraid.org",
        "IP 69.42.215.252: nginx.com\u2022 vb.cu \u2022 vb.il \u2022 yourdomain.com \u2022 yourdomain.com",
        "tv.apple.com",
        "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
        "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
        "https://www.semena.cz/exoticke-okrasne/78-plumerie-havajska-kvetina-semena-3-ks.html",
        "Alerts: physical_drive_access mouse_movement_detect dynamic_function_loading",
        "http://consolefoundry.date/one/gate.php",
        "https://4.base.maps.ls.hereapi.com/maptile/2.1/maptile/newest/normal.day.mobile/{z}/{x}/{y}/256/PNG8?apiKey=wzEuHW02YdaEjU0Em-SwWQBtxbfF86-OfUuq1z93NI4",
        "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il",
        "Alerts: packer_unknown"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Sigur",
            "Virus:win95/cerebrus",
            "Unix.dropper.botnet-6566040-0",
            "Beapy",
            "Win.trojan.emotet-9850453",
            "Code overlap",
            "Trojan:win32/pariham.a",
            "Other malware",
            "Kanna",
            "Nids",
            "Hacktool:win32/powersploit!rfn",
            "Win.dropper.nanocore-10021490-0",
            "Mirai",
            "Worm:win32/autorun!atmn",
            "Tulach",
            "Win.packed.remcos-10024510-0",
            "Win.trojan.blacknetrat-7838854-0",
            "Worm:win32/mydoom.pb!mtb",
            "Autorunit",
            "Psw:win32/vb.cu",
            "Montserrat",
            "Mydoom",
            "Der zugriff"
          ],
          "industries": [
            "Civil society",
            "Legal",
            "Technology",
            "Telecommunications",
            "Insurance",
            "Financial",
            "Healthcare",
            "Government"
          ],
          "unique_indicators": 53020
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/virusshare.com",
    "whois": "http://whois.domaintools.com/virusshare.com",
    "domain": "virusshare.com",
    "hostname": "svr3.virusshare.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "6962b68da732abc66a0c2caf",
      "name": "Der Zugriff \u2022 Kanna \u2022 MyDoom \u2022 Sigur - Pahamify Pegasus",
      "description": "Pahamify Pegasus | Execution Attack, Access Attack | Drive by Compromise | \nSifting through Pahamify Pegasus this is no longer your computer , injection, google connects, remote connections, remote mouse movement, remote access, Google espionage, bad traffic, Apple complicit access. This is your Google account and browser, this is your appleid. Still researching\u2026. || \n*https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_ ||\nMalware: Der Zugriff ,\nKanna ,\nMyDoom ,\nSigur \n#firebase #google_connection #bible_gateway_honeypot #crypto #hidden_users #who_else",
      "modified": "2026-02-09T19:00:09.890000",
      "created": "2026-01-10T20:29:01.675000",
      "tags": [
        "ip address",
        "status code",
        "kb body",
        "iocs",
        "deny age",
        "cloudfront",
        "utc google",
        "tag manager",
        "g8t6ln06z40",
        "utc na",
        "google tag",
        "injection",
        "t1055 malware",
        "tree",
        "help v",
        "defense evasion",
        "injection t1055",
        "resolved ips",
        "get http",
        "dns resolutions",
        "v memory",
        "pattern domains",
        "full reports",
        "v help",
        "memory pattern",
        "urls https",
        "hashes",
        "tiktok",
        "microsoft",
        "dashboard falcon",
        "request",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "response",
        "appleid",
        "united",
        "name servers",
        "aaaa",
        "servers",
        "moved",
        "script urls",
        "passive dns",
        "urls",
        "data upload",
        "extraction",
        "failed",
        "jsvendor",
        "jsapp",
        "script script",
        "cssapp",
        "jsfirebase",
        "pegasus",
        "encrypt",
        "title error",
        "ipv4",
        "files",
        "reverse dns",
        "united states",
        "malware",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "execution att",
        "t1204 user",
        "script",
        "beginstring",
        "bad traffic",
        "et info",
        "null",
        "title",
        "refresh",
        "span",
        "strings",
        "error",
        "tools",
        "meta",
        "look",
        "verify",
        "restart",
        "mitre att",
        "ascii text",
        "pattern match",
        "ck matrix",
        "tls handshake",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "ck techniques",
        "access att",
        "div div",
        "a li",
        "ul div",
        "record value",
        "emails",
        "accept",
        "referen https",
        "microsoft-falcon.net",
        "proxy",
        "status",
        "certificate",
        "updated date",
        "whois server",
        "zipcode",
        "entries http",
        "scans show",
        "search",
        "matches x",
        "type",
        "gmt cache",
        "all ipv4",
        "america flag",
        "america asn",
        "sameorigin",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jan",
        "ipv4 add",
        "win32mydoom jan",
        "trojan",
        "worm",
        "expiration date",
        "files show",
        "date hash",
        "avast avg",
        "win32mydoom",
        "backdoor",
        "found",
        "gmt connection",
        "control",
        "content type",
        "twitter",
        "dynamicloader",
        "medium",
        "high",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "write",
        "global",
        "domain name",
        "hostname",
        "apple",
        "racebook",
        "mouse movement",
        "remote mouse",
        "domain",
        "hostname add",
        "url analysis",
        "crlf line",
        "ff d5",
        "unicode text",
        "utf8",
        "ee fc",
        "yara rule",
        "f0 ff",
        "ff bb",
        "music",
        "push",
        "autorun",
        "unknown",
        "present sep",
        "present may",
        "present jan",
        "present aug",
        "cname",
        "present nov",
        "present jun",
        "apache",
        "body",
        "pragma",
        "found registry",
        "able",
        "model",
        "indicator",
        "source",
        "show technique",
        "file",
        "internet",
        "errore",
        "erreur",
        "download",
        "service",
        "crypto",
        "compiler",
        "installer",
        "yang",
        "updater",
        "shutdown",
        "thunk",
        "este",
        "install",
        "reboot",
        "code",
        "downloader",
        "sigur",
        "kanna",
        "der zugriff",
        "google",
        "chrome",
        "Pahamify Pegasus",
        "christoper p. ahmann",
        "law enforcement",
        "retaliation",
        "phone",
        "espionage",
        "united states",
        "m brian sabey",
        "quasi government",
        "target",
        "monitored targeting",
        "aig",
        "therahand (old name)",
        "target: tsara brashears",
        "douglas county, co",
        "sheriff",
        "industry and commerce",
        "worker\u2019s compensation",
        "crime",
        "financial crime",
        "danger",
        "nem tih",
        "amazon",
        "aws",
        "amazon aws",
        "deal",
        "deal with it lawfully",
        "pay victim",
        "protecting reimer"
      ],
      "references": [
        "https://pegasus.pahamify.com/ \u2022 pahamify.com \u2022 pegasus.pahamify.com \u2022 activation.pahamify.com \u2022 httpspegasus.pahamify.com",
        "https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_",
        "Der Zugriff\u2022 Kanna \u2022 MyDoom \u2022 Sigur",
        "Pahamify Pegasus",
        "Matches rule ET INFO Observed Google DNS over HTTPS Domain (dns google in TLS SNI)",
        "https://graph.facebook.com/v3.3/590584968016991/mobile_sdk_gk?fields=gatekeepers&format=json&sdk_version=5.0.0&sdk=android&platform=android",
        "https://4.base.maps.ls.hereapi.com/maptile/2.1/maptile/newest/normal.day.mobile/{z}/{x}/{y}/256/PNG8?apiKey=wzEuHW02YdaEjU0Em-SwWQBtxbfF86-OfUuq1z93NI4",
        "tv.apple.com",
        "dashboard-proxy-sc-ncus-j7ynx.falcon- core.microsoft-falcon.net",
        "Antivirus Detections: Win.Trojan.Gamarue-9832405-0 ,  Trojan:Win32/Pariham.A",
        "IDS : Commonly Abused File Sharing Site Domain Observed (sendspace .com in DNS Lookup)",
        "IDS: Commonly Abused File Sharing Site Domain Observed (sendspace .com in TLS SNI)",
        "IDS: TLS Handshake Failure",
        "Yara Detections BackdoorWin32Simda",
        "Google_Chrome_64bit_v136.0.7103.49.exe",
        "https://hybrid-analysis.com/sample/e4306740e79c65c90242aef93fceeb93fa6da74577570c7b4a04399879349c37/696298b7667c4a112d04eac7",
        "https://download.filepuma.com/files/web-browsers/google-chrome-64bit-/Google_Chrome_",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 wallpapers-nature.com",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io \u2022",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Pariham.A",
          "display_name": "Trojan:Win32/Pariham.A",
          "target": "/malware/Trojan:Win32/Pariham.A"
        },
        {
          "id": "MyDoom",
          "display_name": "MyDoom",
          "target": null
        },
        {
          "id": "Virus:Win95/Cerebrus",
          "display_name": "Virus:Win95/Cerebrus",
          "target": "/malware/Virus:Win95/Cerebrus"
        },
        {
          "id": "AutoRunIt",
          "display_name": "AutoRunIt",
          "target": null
        },
        {
          "id": "Sigur",
          "display_name": "Sigur",
          "target": null
        },
        {
          "id": "Kanna",
          "display_name": "Kanna",
          "target": null
        },
        {
          "id": "Der Zugriff",
          "display_name": "Der Zugriff",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1124",
          "name": "System Time Discovery",
          "display_name": "T1124 - System Time Discovery"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1213",
          "name": "Data from Information Repositories",
          "display_name": "T1213 - Data from Information Repositories"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1529",
          "name": "System Shutdown/Reboot",
          "display_name": "T1529 - System Shutdown/Reboot"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1559",
          "name": "Inter-Process Communication",
          "display_name": "T1559 - Inter-Process Communication"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1569",
          "name": "System Services",
          "display_name": "T1569 - System Services"
        },
        {
          "id": "T1570",
          "name": "Lateral Tool Transfer",
          "display_name": "T1570 - Lateral Tool Transfer"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1569.002",
          "name": "Service Execution",
          "display_name": "T1569.002 - Service Execution"
        },
        {
          "id": "T1543.003",
          "name": "Windows Service",
          "display_name": "T1543.003 - Windows Service"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1055.003",
          "name": "Thread Execution Hijacking",
          "display_name": "T1055.003 - Thread Execution Hijacking"
        },
        {
          "id": "T1134.001",
          "name": "Token Impersonation/Theft",
          "display_name": "T1134.001 - Token Impersonation/Theft"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1134.002",
          "name": "Create Process with Token",
          "display_name": "T1134.002 - Create Process with Token"
        },
        {
          "id": "T1070.006",
          "name": "Timestomp",
          "display_name": "T1070.006 - Timestomp"
        },
        {
          "id": "T1564.003",
          "name": "Hidden Window",
          "display_name": "T1564.003 - Hidden Window"
        },
        {
          "id": "T1497.003",
          "name": "Time Based Evasion",
          "display_name": "T1497.003 - Time Based Evasion"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1497.002",
          "name": "User Activity Based Checks",
          "display_name": "T1497.002 - User Activity Based Checks"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1074.001",
          "name": "Local Data Staging",
          "display_name": "T1074.001 - Local Data Staging"
        },
        {
          "id": "T1560.002",
          "name": "Archive via Library",
          "display_name": "T1560.002 - Archive via Library"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        }
      ],
      "industries": [
        "Civil Society",
        "Legal",
        "Government",
        "Technology",
        "Telecommunications",
        "Financial"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6094,
        "domain": 1195,
        "hostname": 2001,
        "FileHash-SHA256": 2598,
        "FileHash-MD5": 546,
        "FileHash-SHA1": 403,
        "email": 16,
        "CVE": 2,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 12858,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "70 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692cb6dc24da17618e3d9da6",
      "name": "Mirai Botnet | HackTool Powershell targets LinkedIn User | 192.168.1.1 \u2022  Remote Inbound Outbound Connection",
      "description": "Linux Malware - LinkedIn- True  Mirai Botnet  (192.168.1.1) (Never Connect) Incredibly powerful attack targeting LinkedIn users. In this instance the target is an ex husband of a target. |\nNDO Group relationships seen. This is a Botnet. \n\nMay be \u2018framing\u2019 attack that was launched in 2014. Attackers sent a clear message to target that she + husband would be arrested and charged with possession of 1000\u2019s of \u2018child pornography\u2019  pictures. \n\nAttack 10/10 malicious. Worked from separate system in separate location. Hackers unlocked a device,  zero clicks, removed PSW. Tulach malware seen a profile \u2018Michael Robert\u2019s of Rexxfield\u2019 may be  entity (NSA) with a face like Tulach. Uses the most WILD compromises. Government contractors? \n\nSame attackers  brought down Prudentials \u2018Assurance\u2019 Medicare system forever.\n  ESET hackers only allowing \u2018bad traffic\u2019 .",
      "modified": "2025-12-30T19:04:40.430000",
      "created": "2025-11-30T21:27:56.239000",
      "tags": [
        "enter",
        "extract",
        "enter source",
        "urls",
        "address",
        "remote connect",
        "private ip",
        "sql",
        "inject",
        "montserrat",
        "script urls",
        "germany unknown",
        "xml title",
        "wiesinger",
        "style",
        "ip address",
        "script domains",
        "body doctype",
        "encrypt",
        "botnet",
        "dropper",
        "unix",
        "resolverror",
        "et exploit",
        "outbound",
        "mirai variant",
        "useragent",
        "inbound",
        "et trojan",
        "et webserver",
        "scan mirai",
        "hello",
        "execution",
        "mirai",
        "malware",
        "shell",
        "nids",
        "ids detections",
        "wget command",
        "http headers",
        "dlink devices",
        "home network",
        "mvpower dvr",
        "shell uce",
        "mirai elf",
        "linux malware",
        "is__elf",
        "cnc",
        "meta http",
        "content",
        "gmt server",
        "files",
        "reverse dns",
        "germany",
        "ismaning",
        "germany asn",
        "as5539 spacenet",
        "germany https",
        "auto generated security (?)",
        "redacted for",
        "name servers",
        "aaaa",
        "search",
        "for privacy",
        "title",
        "intel",
        "ms windows",
        "pe32",
        "process32nextw",
        "write c",
        "mssql port",
        "hash",
        "beapy",
        "bit32bit",
        "agent",
        "write",
        "hacktool",
        "win32",
        "next",
        "suspicious user",
        "pybeapy cnc",
        "checkin",
        "w32beapy cnc",
        "beacon",
        "module load",
        "external ip",
        "lookup",
        "home assistant",
        "intptr",
        "uint32",
        "type",
        "parameter",
        "oldprotectflag",
        "mandatory",
        "throw",
        "position",
        "lkshkdandl",
        "success",
        "info",
        "powershell",
        "null",
        "error",
        "date hash",
        "next yara",
        "detections name",
        "medium",
        "graph tree",
        "sample",
        "sample hash",
        "exec bypass",
        "c ipconfig",
        "world",
        "jaws webserver",
        "chmod usage",
        "strings",
        "extraction",
        "data upload",
        "extre",
        "include data",
        "hos hos",
        "y se",
        "sugges",
        "find s",
        "typ hos",
        "hos data",
        "hos hostname",
        "hos host",
        "extr data",
        "tethering",
        "tulach",
        "114.114.114.114",
        "passive dns",
        "pulse pulses",
        "http",
        "related nids",
        "files location",
        "united",
        "flag united",
        "files domain",
        "next associated",
        "ipv4 add",
        "delphi",
        "read c",
        "packing t1045",
        "t1045",
        "worm",
        "code",
        "june",
        "irc nick command",
        "irc",
        "meta",
        "status",
        "record value",
        "unknown aaaa",
        "expiration",
        "url http",
        "indicator role",
        "pulses url",
        "no expiration",
        "url https",
        "url url",
        "o url",
        "request review",
        "hosting",
        "unknown",
        "medium security",
        "extra data",
        "failed",
        "linkedin",
        "url add",
        "ireland flag",
        "ireland",
        "dublin",
        "ireland asn",
        "as16509",
        "spyware",
        "nso",
        "nso group",
        "pegasus related",
        "nso related",
        "framing",
        "porn",
        "python",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "apple",
        "192.168.1.1",
        "law",
        "attorney"
      ],
      "references": [
        "192.168.1.1  - WOW! Use your old equipment in a non - residential environment",
        "http://xn.com/ \u2022 www.xn--linkedinxn-6u6e.com \u2022 http://www.linkedin-xn.com/ \u2022 www.linkedin-xn.com",
        "Powerful Exploit: https://otx.alienvault.com/indicator/file/ba32802bdd1f0b91cf8c667b94426d73ee654ba0",
        "Mirai Botnet - *Inbound & Outbound connection",
        "IDS Detections:  *WGET Command Specifying Output in HTTP Headers",
        "IDS Detections:  *D-Link Devices Home Network Administration Protocol Command Execution",
        "IDS Detections: *JAWS Webserver Unauthenticated Shell Command Execution",
        "IDS Detections: *MVPower DVR Shell UCE *Mirai Variant User-Agent (Outbound)",
        "Yara :  Yara Detections : SUSP_XORed_Mozilla ,  Linux_MiningSoftware ,  is__elf",
        "Alerts :  dead_host nids_exploit_alert nids_malware_alert persistency_initd network_icmp",
        "Alerts : tcp_syn_scan nolookup_communication network_cnc_http network_http",
        "Alerts :  network_http_post nids_alert chmod_syscall writes_to_stdout",
        "Other Mitre ATT&CK T1480 T1553.00  T1027.013  T1057  T1069.002 T1071\tT1071.004",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "pornokind.vgt.pl \u2022 https://pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl \u2022 https://www.pornokind.vgt.pl/",
        "pornlynx.com \u2022 www.pornhub.com \u2022 www.anyxxxtube.com",
        "https://frostty12ice.info/ \u2022 https://lawhubh.info",
        "Needs researching: http://lib.jerusalem.muni.il.il \u2022 https://lib.jerusalem.muni.il.il"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Unix.Dropper.Botnet-6566040-0",
          "display_name": "Unix.Dropper.Botnet-6566040-0",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Montserrat",
          "display_name": "Montserrat",
          "target": null
        },
        {
          "id": "Beapy",
          "display_name": "Beapy",
          "target": null
        },
        {
          "id": "HackTool:Win32/PowerSploit!rfn",
          "display_name": "HackTool:Win32/PowerSploit!rfn",
          "target": "/malware/HackTool:Win32/PowerSploit!rfn"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom.PB!MTB",
          "display_name": "Worm:Win32/Mydoom.PB!MTB",
          "target": "/malware/Worm:Win32/Mydoom.PB!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "TA0036",
          "name": "Exfiltration",
          "display_name": "TA0036 - Exfiltration"
        },
        {
          "id": "TA0039",
          "name": "Remote Service Effects",
          "display_name": "TA0039 - Remote Service Effects"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1019",
          "name": "System Firmware",
          "display_name": "T1019 - System Firmware"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553.001",
          "name": "Gatekeeper Bypass",
          "display_name": "T1553.001 - Gatekeeper Bypass"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1609",
          "name": "Container Administration Command",
          "display_name": "T1609 - Container Administration Command"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        }
      ],
      "industries": [
        "Government",
        "Legal",
        "Healthcare",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4147,
        "domain": 871,
        "hostname": 2194,
        "FileHash-MD5": 279,
        "FileHash-SHA1": 257,
        "FileHash-SHA256": 2183,
        "CVE": 6,
        "email": 3,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 9941,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "111 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6920c43c3772bb24f26f70cc",
      "name": "Xred_Malware \u2022 Dark Comet \u2022 Darkgate \u2022 Elex \u2022 Glassworm | AutoRun",
      "description": "Attack originates from government contractors/ quasi governmental entities. Criminal Defense and Government contracted Law firms commonly abuse these tactics. Targeting. Found in data of a target. Focused on (1) FILE HASH and (1)  IP address .[referenced] *XRed _Mal\n* EXE Infection | OTX  auto populated - Adversaries may be able to gain access to victim systems using a variety of techniques to evade detection and conceal their actions. and their intentions, as well as using other techniques, to avoid detection.",
      "modified": "2025-12-21T18:01:07.268000",
      "created": "2025-11-21T19:57:48.145000",
      "tags": [
        "dynamicloader",
        "write c",
        "write",
        "high",
        "yara rule",
        "myapp",
        "delphi",
        "worm",
        "win32",
        "error",
        "code",
        "malware",
        "defender",
        "medium",
        "binary file",
        "heavensgate",
        "bochs",
        "dynamic",
        "td td",
        "td tr",
        "united",
        "a td",
        "a domains",
        "dynamic dns",
        "static dns",
        "dd wrt",
        "twitter",
        "trojan",
        "trojandropper",
        "null",
        "enough",
        "simple",
        "click",
        "easy",
        "premium",
        "associated urls",
        "server response",
        "google safe",
        "results nov",
        "avast avg",
        "11.21.2025",
        "11.20.2025",
        "borland delphi",
        "pe32",
        "intel",
        "ms windows",
        "inno setup",
        "win32 exe",
        "pecompact",
        "delphi generic",
        "pe32 compiler",
        "dark comet",
        "dark gate",
        "glassworm",
        "md5 code",
        "data",
        "porkbun llc",
        "windows match",
        "getprocaddress",
        "peb idrdata",
        "match peb",
        "t1547",
        "t1059 t1112",
        "shared modules",
        "t1129",
        "boot",
        "logon autostart",
        "execu",
        "t1134 boot",
        "encoding",
        "capture e1113",
        "file attributes",
        "analysis ob0001",
        "b0001 software",
        "virtual machine",
        "detection b0009",
        "analysis ob0002",
        "ob0003 screen",
        "windows get",
        "check",
        "encode",
        "check internet",
        "wininet set",
        "clear file",
        "enumerate gui",
        "get hostname",
        "get keyboard",
        "set registry",
        "find",
        "capture",
        "url http",
        "consolefoundry",
        "console foundry",
        "foundry",
        "malware catalog tree",
        "autorun keys",
        "modification",
        "alexander karp",
        "peter theil",
        "christoper ahmann",
        "christopher pool",
        "mercedes",
        "apple",
        "palantir",
        "adversarial",
        "adversaries",
        "hostile",
        "quasi",
        "empty hash",
        "denver",
        "mal_xred_backdoor",
        "backdoor",
        "xred",
        "brian sabey",
        "first-send-petikvx",
        "stop",
        "glassworm",
        "elex",
        "darkgate",
        "dark-comet",
        "search",
        "entries",
        "show",
        "yara detections",
        "icmp traffic",
        "rtf file",
        "top source",
        "top destination",
        "format",
        "host",
        "copy",
        "next",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "found",
        "access att",
        "font",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "sha256",
        "mitre att",
        "title",
        "meta",
        "hybrid",
        "local",
        "path",
        "strings",
        "body",
        "contact",
        "trace",
        "form",
        "bitcoin",
        "core",
        "jeffrey reimer",
        "exe infection",
        "cve",
        "porn"
      ],
      "references": [
        "FILEHASH-SHA256 d0ce79b3e0f4798423871dd66c14172b1a0eac34131c1b92d210a7b5c31a8aa0",
        "Name 2025-11-19_b627882129bf281be5a3df318fff678b_dark-comet_darkgate_elex_glassworm_stop",
        "Antivirus Detection: Worm:Win32/AutoRun!atmn [Win.Trojan.Emotet relationship]",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara : Zeppelin_30 ,  compromised_site_redirector_fromcharcode ,",
        "Yara : BobSoft Mini Delphi -> BoB / BobSoft , Delphi",
        "Alerts : suspicious_iocontrol_codes process_creation_suspicious_location network_dyndns",
        "Alerts: multiple_useragents persistence_autorun binary_yara procmem_yara suricata_alert",
        "Alerts: antivm_bochs_keys antivm_generic_disk enumerates_physical_drives  antisandbox_sleep",
        "Alerts: physical_drive_access mouse_movement_detect dynamic_function_loading",
        "Alerts: http_request resumethread_remote_process antianalysis_tls_section network_httpn",
        "Alerts: packer_unknown",
        "Malicious IP Contacted: 69.42.215.252",
        "Abused Domains Contacted: xred.mooo.com freedns.afraid.org",
        "IP 69.42.215.252: http://nginx.com/ \u2022nginx.com\t\u2022 http://nginx.org/ \u2022 nginx.org \u2022 afraid.org \u2022 afraid.org",
        "IP 69.42.215.252: nginx.com\u2022 vb.cu \u2022 vb.il \u2022 yourdomain.com \u2022 yourdomain.com",
        "IP 69.42.215.252: theirname.yourdomain.com \u2022 www.freebsd.org freebsd.org \u2022 your.domain.com",
        "Windows Match api: GetProcAddress fs access  *access PEB Idr_data Match PEB access fs access",
        "consolefoundry.date \u2022 http://consolefoundry.date \u2022 http://consolefoundry",
        "Matches rule Wow6432Node CurrentVersion Autorun Keys Modification -  Credits (split) below",
        "by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "http://freedns.afraid.org/images/apple.gif",
        "https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "https://www.mumuplayer.com/redirect/customerservice/_wig",
        "https://www.mumuplayer.com/redirect/customerservice/fB)y",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ \u2022 http://www.anyxxxtube/",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t| Truth",
        "https://www.semena.cz/exoticke-okrasne/78-plumerie-havajska-kvetina-semena-3-ks.html",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "http://consolefoundry.date/one/gate.php",
        "https://hybrid-analysis.com/sample/ba5890ad431b894b0dfd6c9d3f3d6cbd7fedae1bd5a51483f54b22ba0209e3b8/6920be8a548209db740dd354"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453",
          "display_name": "Win.Trojan.Emotet-9850453",
          "target": null
        },
        {
          "id": "Win.Trojan.BlackNetRAT-7838854-0",
          "display_name": "Win.Trojan.BlackNetRAT-7838854-0",
          "target": null
        },
        {
          "id": "Win.Dropper.Nanocore-10021490-0",
          "display_name": "Win.Dropper.Nanocore-10021490-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Win.Packed.Remcos-10024510-0",
          "display_name": "Win.Packed.Remcos-10024510-0",
          "target": null
        },
        {
          "id": "Code Overlap",
          "display_name": "Code Overlap",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "PSW:Win32/VB.CU",
          "display_name": "PSW:Win32/VB.CU",
          "target": "/malware/PSW:Win32/VB.CU"
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1541",
          "name": "Foreground Persistence",
          "display_name": "T1541 - Foreground Persistence"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1470",
          "name": "Obtain Device Cloud Backups",
          "display_name": "T1470 - Obtain Device Cloud Backups"
        },
        {
          "id": "T1078.004",
          "name": "Cloud Accounts",
          "display_name": "T1078.004 - Cloud Accounts"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 460,
        "FileHash-SHA1": 437,
        "FileHash-SHA256": 4483,
        "SSLCertFingerprint": 2,
        "URL": 6487,
        "hostname": 1772,
        "domain": 652,
        "CVE": 3,
        "email": 5
      },
      "indicator_count": 14301,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "120 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68dc624893ea922b898f911b",
      "name": "FBI? Ghe real one? Idk - Cab / Deive by compromised an iOS device",
      "description": "Checking a targets phone, it\u2019s seems very infected with limited results on google searches results. I clicked on an image I thought looked suspicious. Image was coded. I have no idea if this is the FBI I haven\u2019t examined or researched for vulnerabilities yet. I will break this down over time. The number is kept alive but number could not be verified , it was a different number altogether. The phone was out of service, I reached out to 911. And spoke to a person I can\u2019t verify. The service was reconnected a day later. It\u2019s a very crazy hack!",
      "modified": "2025-10-30T22:01:00.256000",
      "created": "2025-09-30T23:05:44.154000",
      "tags": [
        "search",
        "google search",
        "in a",
        "relevance",
        "internet storm",
        "intranet",
        "part",
        "steps",
        "hyper v",
        "windowssystem32",
        "ping request",
        "algorithm",
        "ouno sni",
        "key usage",
        "google llc",
        "v3 serial",
        "number",
        "public key",
        "info",
        "key algorithm",
        "domain",
        "subject key",
        "identifier",
        "net173",
        "net1730000",
        "gogl",
        "orgid",
        "gogl address",
        "city",
        "mountain view",
        "stateprov",
        "postalcode",
        "registrar",
        "ip address",
        "http",
        "port",
        "accept",
        "info file",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "shutdown",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "defense evasion",
        "spawns",
        "found",
        "united",
        "ascii text",
        "pattern match",
        "mitre att",
        "title",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "body",
        "initial access",
        "local",
        "passive dns",
        "urls",
        "url add",
        "related nids",
        "files location",
        "flag united",
        "backdoor",
        "status",
        "aaaa",
        "date",
        "name servers",
        "record value",
        "emails",
        "present aug",
        "present sep",
        "moved",
        "error",
        "antivm",
        "drive by",
        "cab by"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 544,
        "FileHash-SHA256": 2300,
        "URL": 3905,
        "hostname": 1675,
        "FileHash-MD5": 209,
        "FileHash-SHA1": 210,
        "CIDR": 1,
        "email": 7,
        "SSLCertFingerprint": 8,
        "CVE": 2
      },
      "indicator_count": 8861,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "172 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "676493c5607a603f1785a935",
      "name": "https://ginko.garden/pl/contact tel:+48 797 920 339  ip4 77.79.221.180   77.79.221.148",
      "description": "Pasywna replikacja DNS: \n77.79.221.180  \nSugerowany opis:\nPe\u0142ny tekst Ginko.Garden - Nowoczesne dekoracje i pergole metalowe - wedi dweud eu glass - metaloplastyka.\nSugerowane identyfikatory ATT&CK:\nOgr\u00f3d - Nowoczesne dekoracje z metalu do ogrodu - bi\u017cuteria ogrodowa i dekoracje szklane - pergole metalowe - metaloplastyka Meta Tagi s\u0142owa kluczowe Nowoczesne dekoracje z metalu do ogrodu - pergole metalowe - Ginko.\n77.79.221.148  \n46.41.159.227  \n46.41.159.177",
      "modified": "2025-07-28T11:51:42.400000",
      "created": "2024-12-19T21:44:37.537000",
      "tags": [
        "copyright",
        "customevent",
        "typeof e",
        "boomerang",
        "typeof t",
        "macintosh",
        "os x",
        "post",
        "typeof",
        "iframe",
        "date",
        "nazwa rekordu",
        "aaaaa",
        "na wniosek",
        "bezpieczestwo",
        "serwer",
        "przerwa",
        "informacja o",
        "prace",
        "nazwa",
        "hasze",
        "adresy url",
        "nazwa http",
        "configoverride",
        "continuity",
        "pageparam s",
        "iframedelay",
        "autoxhr",
        "historia",
        "nazwa https",
        "uytkownik",
        "zenbox",
        "komunikacja",
        "pliki",
        "rozmiar",
        "kb data",
        "wykrycia nie",
        "mitre",
        "ids nie",
        "sigmy nie",
        "submission",
        "sha256",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "unicode text",
        "utf8 text",
        "trid hypertext",
        "markup language"
      ],
      "references": [
        "https://s.go-mpulse.net/boomerang/XZ4AH-ABKPW-SQPBC-CYWES-BCG6V",
        "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=7a025cc6-5167-43cf-947f-387a3b830778",
        "https://aplikacja.ceidg.gov.pl/CEIDG/CEIDG.Public.UI/SearchDetails.aspx?Id=f3ee4c4e-e009-4d69-82da-eef3bad1ecc4"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1334,
        "hostname": 454,
        "domain": 346,
        "IPv6": 2,
        "IPv4": 36,
        "FileHash-SHA256": 1499,
        "FileHash-MD5": 92,
        "FileHash-SHA1": 74,
        "CVE": 1,
        "email": 1
      },
      "indicator_count": 3839,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 123,
      "modified_text": "266 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6841039ff61dea1fcdcc53c1",
      "name": "Malicious WiFi Internet network | trojan.morstar/bundler",
      "description": "WiFi / Internet provider \nConcerning- targeting?\nhttp://www.dead-speak.com/PsychicMediums.htm | \nhttp://www.dead-speak.com/PsychicMediums.html |\nwww.dead-speak.com || https://pin.it/ | \nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian |\npin.it |",
      "modified": "2025-07-05T02:01:54.546000",
      "created": "2025-06-05T02:40:31.779000",
      "tags": [
        "win32 exe",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "get http",
        "post http",
        "dns resolutions",
        "resolved ips",
        "symantec time",
        "stamping",
        "from",
        "algorithm",
        "thumbprint",
        "thumbprint md5",
        "signer",
        "g2 issuer",
        "ca valid",
        "serial number",
        "time stamping",
        "g4 issuer",
        "g2 valid",
        "usage ff",
        "code signing",
        "issuer certum",
        "certum code",
        "signing ca",
        "trusted network",
        "e5 e5",
        "d4 portable",
        "sha256",
        "overlay",
        "defense evasion",
        "access ta0006",
        "command",
        "control ta0011",
        "catalog tree",
        "anti",
        "ob0001",
        "analysis ob0002",
        "control ob0004",
        "ob0007 impact",
        "ob0012 file",
        "system oc0001",
        "memory oc0002",
        "data oc0004"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "FileHash-MD5": 156,
        "FileHash-SHA1": 139,
        "FileHash-SHA256": 3313,
        "URL": 1223,
        "domain": 186,
        "hostname": 313
      },
      "indicator_count": 5332,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "289 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://svr3.virusshare.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://svr3.virusshare.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776727261.3681955
}