{
  "type": "URL",
  "indicator": "https://sync.taneda.xyz",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://sync.taneda.xyz",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2999292596,
      "indicator": "https://sync.taneda.xyz",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 14,
      "pulses": [
        {
          "id": "687f0f210ec1de4316b22522",
          "name": "Strange Medical Facility with Overt Bad Actors Spying on Disabled",
          "description": "Strange Medical Facility with Overt Bad Actors already Spying on Disabled. Everything including bathroom is monitored.\nfounderintech.com\nwww.galbutfamilyfoundation.com\t\nwpengine.com\t\nhttps://foundry2sdbl.dvr.dn2.n-helix.com\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\npegasusthruster.com\t\nhttps://www.pegasusthruster.com/\t\nsmtp.pegasustech.net\nhttp://pegasusthruster.com/shoppegasus/includes/att",
          "modified": "2025-08-21T03:02:43.704000",
          "created": "2025-07-22T04:10:09.158000",
          "tags": [
            "date",
            "submit url",
            "analysis",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "asn as13335",
            "whois registrar",
            "creation date",
            "extraction",
            "data",
            "extri",
            "include review",
            "iocs",
            "data upload",
            "united",
            "unknown aaaa",
            "search",
            "showing",
            "moved",
            "a domains",
            "record value",
            "body"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6560,
            "FileHash-MD5": 121,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 3989,
            "domain": 1616,
            "hostname": 1876,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 14292,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "242 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a958f96f9b29641ea020",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:03:20.219000",
          "created": "2023-12-06T17:03:20.219000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a927b24b94cdd5d344d1",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:02:31.854000",
          "created": "2023-12-06T17:02:31.854000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570800373899fd03e2e49db",
          "name": "Democrats.org",
          "description": "",
          "modified": "2023-12-06T14:06:59.250000",
          "created": "2023-12-06T14:06:59.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3114,
            "domain": 3501,
            "hostname": 3860,
            "URL": 17938,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707ec3c760eea3873db672",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2023-12-06T14:01:39.582000",
          "created": "2023-12-06T14:01:39.582000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 1950,
            "hostname": 1620,
            "domain": 900,
            "URL": 6563
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653bf3b076e4dbcd0c099992",
          "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
          "description": "DeepScan run (absolute overkill). I witnessed excessive data use, device is completely practically unusable, many black pages, denial of most services. CNC. Browser bar became a malicious app that returns 0 searches. Attack directed towards my devices.\nNo stone left unturned. Passwords taken. Apps installed to device Covered can on device takes pictures/flash at will. Evasive. Very talented hackers.  \nBravo! Very intrusive. Constantly attacking.\nTarget: Tsara Brashears and researcher",
          "modified": "2023-11-26T14:04:04.692000",
          "created": "2023-10-27T17:30:24.926000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "collections",
            "contacted",
            "efr1",
            "parent domain",
            "amazon 02",
            "metro",
            "crypto",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malware",
            "alexa top",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "opencandy",
            "riskware",
            "unsafe",
            "phishing",
            "zbot",
            "team",
            "exploit",
            "agent",
            "mimikatz",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "downldr",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "artemis",
            "blacknet rat",
            "stealer",
            "trojanspy",
            "blacklist https",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag count",
            "tsara brashears",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "whois record",
            "contacted urls",
            "siblings domain",
            "execution",
            "goldmax",
            "goldfinder",
            "sibot",
            "emotet",
            "united",
            "phishing site",
            "maltiverse",
            "adware",
            "phishtank",
            "xtrat",
            "xrat",
            "redline stealer",
            "xtreme",
            "crack",
            "genkryptik",
            "deepscan",
            "win64",
            "quasar rat",
            "fareit",
            "downloader",
            "trojan",
            "alexa",
            "iframe",
            "cve201711882",
            "phish",
            "genpack",
            "suspicious",
            "magazine",
            "applicunwnt",
            "cobalt strike",
            "malicious",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "ascii text",
            "mitre att",
            "ck id",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "pmejdjsu12",
            "Royal Bank of Scotland",
            "Phishing Bank of America Corporation",
            "Phishing Netflix",
            "Phishing Wells Fargo",
            "Phishing RuneScape",
            "Phishing Internal Revenue Service",
            "Phtarget unspecified phishing",
            "PAYPAL phishing",
            "Phishing Indeed",
            "Phishing eBay, Inc",
            "PhisSafe",
            "mobigame",
            "Phishing Facebook",
            "remote",
            "mitm",
            "tower",
            "worm",
            "firm",
            "privilege",
            "attacker",
            "monitoring",
            "cyber threat",
            "apple",
            "illegal",
            "DNS_PROBE_STARTED",
            "insurance",
            "revenge",
            "legal entities",
            "https://boxofporn.com"
          ],
          "references": [],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan.Hotkeychick",
              "display_name": "Trojan.Hotkeychick",
              "target": null
            },
            {
              "id": "CVE Exploits",
              "display_name": "CVE Exploits",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Virus.Sality",
              "display_name": "Virus.Sality",
              "target": null
            },
            {
              "id": "W32.Malware",
              "display_name": "W32.Malware",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "Trojan.OTNR",
              "display_name": "Trojan.OTNR",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Mimikatz - S0002",
              "display_name": "Mimikatz - S0002",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "Downloader.OpenCandy",
              "display_name": "Downloader.OpenCandy",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "GoogleToolbar",
              "display_name": "GoogleToolbar",
              "target": null
            },
            {
              "id": "BScope.Adware.MSIL",
              "display_name": "BScope.Adware.MSIL",
              "target": null
            },
            {
              "id": "Application.Auslogics",
              "display_name": "Application.Auslogics",
              "target": null
            },
            {
              "id": "PE.Heur",
              "display_name": "PE.Heur",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler.DownloadGuide",
              "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
              "target": null
            },
            {
              "id": "Trojan:Win32/Xtrat",
              "display_name": "Trojan:Win32/Xtrat",
              "target": "/malware/Trojan:Win32/Xtrat"
            },
            {
              "id": "Xtreme RAT",
              "display_name": "Xtreme RAT",
              "target": null
            },
            {
              "id": "ML.Attribute",
              "display_name": "ML.Attribute",
              "target": null
            },
            {
              "id": "AGEN.1045143",
              "display_name": "AGEN.1045143",
              "target": null
            },
            {
              "id": "Hoax.DeceptPCClean",
              "display_name": "Hoax.DeceptPCClean",
              "target": null
            },
            {
              "id": "Packed.Themida",
              "display_name": "Packed.Themida",
              "target": null
            },
            {
              "id": "MSIL_Bladabindi.G.gen",
              "display_name": "MSIL_Bladabindi.G.gen",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.34090",
              "display_name": "Gen:NN.ZexaF.34090",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_95% 2",
              "display_name": "Unsafe.AI_Score_95% 2",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink 2",
              "display_name": "JS:Trojan.HideLink 2",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Application.BitCoinMiner",
              "display_name": "Application.BitCoinMiner",
              "target": null
            },
            {
              "id": "WebToolbar.Asparnet",
              "display_name": "WebToolbar.Asparnet",
              "target": null
            },
            {
              "id": "W32.HfsAutoB",
              "display_name": "W32.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Application.Deceptor",
              "display_name": "Application.Deceptor",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "HEUR:Hoax.PCFixer",
              "display_name": "HEUR:Hoax.PCFixer",
              "target": null
            },
            {
              "id": "Gen:Variant.Jacard",
              "display_name": "Gen:Variant.Jacard",
              "target": null
            },
            {
              "id": "Tool.Patcher",
              "display_name": "Tool.Patcher",
              "target": null
            },
            {
              "id": "Trojan.Khalesi 2\tAdware 2",
              "display_name": "Trojan.Khalesi 2\tAdware 2",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_94%",
              "display_name": "Unsafe.AI_Score_94%",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Warezov.gen3",
              "display_name": "Warezov.gen3",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Nemucod.21C8",
              "display_name": "Nemucod.21C8",
              "target": null
            },
            {
              "id": "Asparnet.P",
              "display_name": "Asparnet.P",
              "target": null
            },
            {
              "id": "InstallCore.Gen7",
              "display_name": "InstallCore.Gen7",
              "target": null
            },
            {
              "id": "CsQKHtaAI",
              "display_name": "CsQKHtaAI",
              "target": null
            },
            {
              "id": "Clicker.VB",
              "display_name": "Clicker.VB",
              "target": null
            },
            {
              "id": "Exploit.Zip.Heuristic",
              "display_name": "Exploit.Zip.Heuristic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GandCrab",
              "display_name": "Trojan.Ransom.GandCrab",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "ScrInject.eric",
              "display_name": "ScrInject.eric",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Diztakun",
              "display_name": "HEUR:Trojan.Diztakun",
              "target": null
            },
            {
              "id": "Agent.OCJ",
              "display_name": "Agent.OCJ",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Hacktool.Crack",
              "display_name": "Hacktool.Crack",
              "target": null
            },
            {
              "id": "Backdoor.DTR.15",
              "display_name": "Backdoor.DTR.15",
              "target": null
            },
            {
              "id": "Freemake.A potentially unwanted",
              "display_name": "Freemake.A potentially unwanted",
              "target": null
            },
            {
              "id": "Absolute Uninstaller",
              "display_name": "Absolute Uninstaller",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "Trojan.Small",
              "display_name": "Trojan.Small",
              "target": null
            },
            {
              "id": "HackTool.Crack",
              "display_name": "HackTool.Crack",
              "target": null
            },
            {
              "id": "Generic.Application.JS.Sobrab.1",
              "display_name": "Generic.Application.JS.Sobrab.1",
              "target": null
            },
            {
              "id": "Trojan.Rozena",
              "display_name": "Trojan.Rozena",
              "target": null
            },
            {
              "id": "Trojan.Downloader",
              "display_name": "Trojan.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Bayrob",
              "display_name": "Trojan.Bayrob",
              "target": null
            },
            {
              "id": "Adware.OxyPumper",
              "display_name": "Adware.OxyPumper",
              "target": null
            },
            {
              "id": "Worm.Chir",
              "display_name": "Worm.Chir",
              "target": null
            },
            {
              "id": "Trojan.Linux.Generic",
              "display_name": "Trojan.Linux.Generic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Boxter.819",
              "display_name": "Heur.BZC.YAX.Boxter.819",
              "target": null
            },
            {
              "id": "Faceliker.D",
              "display_name": "Faceliker.D",
              "target": null
            },
            {
              "id": "Adware",
              "display_name": "Adware",
              "target": null
            },
            {
              "id": "DeepScan:Generic.BrResMon.1",
              "display_name": "DeepScan:Generic.BrResMon.1",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "Trojan.Brsecmon",
              "display_name": "Trojan.Brsecmon",
              "target": null
            },
            {
              "id": "SigRiskware.LespeedTechnologyLtd",
              "display_name": "SigRiskware.LespeedTechnologyLtd",
              "target": null
            },
            {
              "id": "Doplik.J",
              "display_name": "Doplik.J",
              "target": null
            },
            {
              "id": "Backdoor.Nhopro",
              "display_name": "Backdoor.Nhopro",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.32515",
              "display_name": "Gen:NN.ZemsilF.32515",
              "target": null
            },
            {
              "id": "Downware",
              "display_name": "Downware",
              "target": null
            },
            {
              "id": "MxResIcn.Heur",
              "display_name": "MxResIcn.Heur",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "Magazine phishing",
              "display_name": "Magazine phishing",
              "target": null
            },
            {
              "id": "ApplicUnwnt@#2n6\tIRS",
              "display_name": "ApplicUnwnt@#2n6\tIRS",
              "target": null
            },
            {
              "id": "TEL:Trojan:HTML/Phishing",
              "display_name": "TEL:Trojan:HTML/Phishing",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Trojan.GandCrypt",
              "display_name": "Trojan.GandCrypt",
              "target": null
            },
            {
              "id": "Redirector.AN",
              "display_name": "Redirector.AN",
              "target": null
            },
            {
              "id": "Agent.CUX.gen",
              "display_name": "Agent.CUX.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler",
              "display_name": "Gen:Variant.Application.Bundler",
              "target": null
            },
            {
              "id": "Downloader.Generic",
              "display_name": "Downloader.Generic",
              "target": null
            },
            {
              "id": "Trojan.ClipBanker",
              "display_name": "Trojan.ClipBanker",
              "target": null
            },
            {
              "id": "TrojanDropper.Autit",
              "display_name": "TrojanDropper.Autit",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "QVM05.1.08E5.Malware",
              "display_name": "QVM05.1.08E5.Malware",
              "target": null
            },
            {
              "id": "Trojan.CookiesStealer",
              "display_name": "Trojan.CookiesStealer",
              "target": null
            },
            {
              "id": "Agent.MU",
              "display_name": "Agent.MU",
              "target": null
            },
            {
              "id": "Wacatac.B",
              "display_name": "Wacatac.B",
              "target": null
            },
            {
              "id": "Dropper.Gen",
              "display_name": "Dropper.Gen",
              "target": null
            },
            {
              "id": "WiseCleaner.A potentially unwanted",
              "display_name": "WiseCleaner.A potentially unwanted",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34170",
              "display_name": "Gen:NN.ZemsilF.34170",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILHeracles",
              "display_name": "Gen:Variant.MSILHeracles",
              "target": null
            },
            {
              "id": "Trojan.DownLoader33",
              "display_name": "Trojan.DownLoader33",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Program.Freemake",
              "display_name": "Program.Freemake",
              "target": null
            },
            {
              "id": "Kryptik.dawvk",
              "display_name": "Kryptik.dawvk",
              "target": null
            },
            {
              "id": "AdwareSig [Adw]",
              "display_name": "AdwareSig [Adw]",
              "target": null
            },
            {
              "id": "Phishing JPMorgan Chase and Co.",
              "display_name": "Phishing JPMorgan Chase and Co.",
              "target": null
            },
            {
              "id": "Adware.BrowseFoxCRTD",
              "display_name": "Adware.BrowseFoxCRTD",
              "target": null
            },
            {
              "id": "Suspici.1F4405D1",
              "display_name": "Suspici.1F4405D1",
              "target": null
            },
            {
              "id": "PUA.Wombat",
              "display_name": "PUA.Wombat",
              "target": null
            },
            {
              "id": "AdWare.DealPly",
              "display_name": "AdWare.DealPly",
              "target": null
            },
            {
              "id": "Injector.CUAM",
              "display_name": "Injector.CUAM",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "Troj_Gen.F04IE00CI19",
              "display_name": "Troj_Gen.F04IE00CI19",
              "target": null
            },
            {
              "id": "Worm.Autorun",
              "display_name": "Worm.Autorun",
              "target": null
            },
            {
              "id": "Worm.Boychi",
              "display_name": "Worm.Boychi",
              "target": null
            },
            {
              "id": "Worm.Allaple",
              "display_name": "Worm.Allaple",
              "target": null
            },
            {
              "id": "CVE-2014-3153",
              "display_name": "CVE-2014-3153",
              "target": null
            },
            {
              "id": "BehavesLike.ICLoader",
              "display_name": "BehavesLike.ICLoader",
              "target": null
            },
            {
              "id": "BScope.Backdoor",
              "display_name": "BScope.Backdoor",
              "target": null
            },
            {
              "id": "Trojan.WIN32.PDF.Alien",
              "display_name": "Trojan.WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "PUP.Systweak",
              "display_name": "PUP.Systweak",
              "target": null
            },
            {
              "id": "Sabsik.FL.B",
              "display_name": "Sabsik.FL.B",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Gen:Variant.Tedy HackTool.VulnDriver",
              "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
              "target": null
            },
            {
              "id": "Backdoor.Predator",
              "display_name": "Backdoor.Predator",
              "target": null
            },
            {
              "id": "Kryptik.GKQR",
              "display_name": "Kryptik.GKQR",
              "target": null
            },
            {
              "id": "DarkKomet.ife",
              "display_name": "DarkKomet.ife",
              "target": null
            },
            {
              "id": "BehavesLike.Downloader",
              "display_name": "BehavesLike.Downloader",
              "target": null
            },
            {
              "id": "Trojan.JS.Iframe",
              "display_name": "Trojan.JS.Iframe",
              "target": null
            },
            {
              "id": "InstallCore.NP",
              "display_name": "InstallCore.NP",
              "target": null
            },
            {
              "id": "Generic.JS.BlackHole",
              "display_name": "Generic.JS.BlackHole",
              "target": null
            },
            {
              "id": "Dropper.Wanna",
              "display_name": "Dropper.Wanna",
              "target": null
            },
            {
              "id": "Remote Utilities",
              "display_name": "Remote Utilities",
              "target": null
            },
            {
              "id": "W32.InstallCore.AGX",
              "display_name": "W32.InstallCore.AGX",
              "target": null
            },
            {
              "id": "NetTool.RemoteExec",
              "display_name": "NetTool.RemoteExec",
              "target": null
            },
            {
              "id": "Bondat.A",
              "display_name": "Bondat.A",
              "target": null
            },
            {
              "id": "VM201.0.B70B.Malware",
              "display_name": "VM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "Infected.WebPage",
              "display_name": "Infected.WebPage",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Script",
              "display_name": "HEUR:Exploit.Script",
              "target": null
            },
            {
              "id": "BScope.TrojanDownloader",
              "display_name": "BScope.TrojanDownloader",
              "target": null
            },
            {
              "id": "HTML:RedirBA",
              "display_name": "HTML:RedirBA",
              "target": null
            },
            {
              "id": "Trojan.BAT.Qhost",
              "display_name": "Trojan.BAT.Qhost",
              "target": null
            },
            {
              "id": "HTML:RedirME",
              "display_name": "HTML:RedirME",
              "target": null
            },
            {
              "id": "TrojWare.JS.AdWare.Agent",
              "display_name": "TrojWare.JS.AdWare.Agent",
              "target": null
            },
            {
              "id": "Packed.Dico",
              "display_name": "Packed.Dico",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1602.001",
              "name": "SNMP (MIB Dump)",
              "display_name": "T1602.001 - SNMP (MIB Dump)"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1695,
            "FileHash-SHA1": 756,
            "FileHash-SHA256": 2029,
            "domain": 290,
            "URL": 1854,
            "hostname": 568,
            "CVE": 5
          },
          "indicator_count": 7197,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "876 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f09785f9ee8aebca2a667",
          "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
          "description": "",
          "modified": "2023-11-26T14:04:04.692000",
          "created": "2023-10-30T01:40:08.022000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "collections",
            "contacted",
            "efr1",
            "parent domain",
            "amazon 02",
            "metro",
            "crypto",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malware",
            "alexa top",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "opencandy",
            "riskware",
            "unsafe",
            "phishing",
            "zbot",
            "team",
            "exploit",
            "agent",
            "mimikatz",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "downldr",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "artemis",
            "blacknet rat",
            "stealer",
            "trojanspy",
            "blacklist https",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag count",
            "tsara brashears",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "whois record",
            "contacted urls",
            "siblings domain",
            "execution",
            "goldmax",
            "goldfinder",
            "sibot",
            "emotet",
            "united",
            "phishing site",
            "maltiverse",
            "adware",
            "phishtank",
            "xtrat",
            "xrat",
            "redline stealer",
            "xtreme",
            "crack",
            "genkryptik",
            "deepscan",
            "win64",
            "quasar rat",
            "fareit",
            "downloader",
            "trojan",
            "alexa",
            "iframe",
            "cve201711882",
            "phish",
            "genpack",
            "suspicious",
            "magazine",
            "applicunwnt",
            "cobalt strike",
            "malicious",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "ascii text",
            "mitre att",
            "ck id",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "pmejdjsu12",
            "Royal Bank of Scotland",
            "Phishing Bank of America Corporation",
            "Phishing Netflix",
            "Phishing Wells Fargo",
            "Phishing RuneScape",
            "Phishing Internal Revenue Service",
            "Phtarget unspecified phishing",
            "PAYPAL phishing",
            "Phishing Indeed",
            "Phishing eBay, Inc",
            "PhisSafe",
            "mobigame",
            "Phishing Facebook",
            "remote",
            "mitm",
            "tower",
            "worm",
            "firm",
            "privilege",
            "attacker",
            "monitoring",
            "cyber threat",
            "apple",
            "illegal",
            "DNS_PROBE_STARTED",
            "insurance",
            "revenge",
            "legal entities",
            "https://boxofporn.com"
          ],
          "references": [],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan.Hotkeychick",
              "display_name": "Trojan.Hotkeychick",
              "target": null
            },
            {
              "id": "CVE Exploits",
              "display_name": "CVE Exploits",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Virus.Sality",
              "display_name": "Virus.Sality",
              "target": null
            },
            {
              "id": "W32.Malware",
              "display_name": "W32.Malware",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "Trojan.OTNR",
              "display_name": "Trojan.OTNR",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Mimikatz - S0002",
              "display_name": "Mimikatz - S0002",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "Downloader.OpenCandy",
              "display_name": "Downloader.OpenCandy",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "GoogleToolbar",
              "display_name": "GoogleToolbar",
              "target": null
            },
            {
              "id": "BScope.Adware.MSIL",
              "display_name": "BScope.Adware.MSIL",
              "target": null
            },
            {
              "id": "Application.Auslogics",
              "display_name": "Application.Auslogics",
              "target": null
            },
            {
              "id": "PE.Heur",
              "display_name": "PE.Heur",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler.DownloadGuide",
              "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
              "target": null
            },
            {
              "id": "Trojan:Win32/Xtrat",
              "display_name": "Trojan:Win32/Xtrat",
              "target": "/malware/Trojan:Win32/Xtrat"
            },
            {
              "id": "Xtreme RAT",
              "display_name": "Xtreme RAT",
              "target": null
            },
            {
              "id": "ML.Attribute",
              "display_name": "ML.Attribute",
              "target": null
            },
            {
              "id": "AGEN.1045143",
              "display_name": "AGEN.1045143",
              "target": null
            },
            {
              "id": "Hoax.DeceptPCClean",
              "display_name": "Hoax.DeceptPCClean",
              "target": null
            },
            {
              "id": "Packed.Themida",
              "display_name": "Packed.Themida",
              "target": null
            },
            {
              "id": "MSIL_Bladabindi.G.gen",
              "display_name": "MSIL_Bladabindi.G.gen",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.34090",
              "display_name": "Gen:NN.ZexaF.34090",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_95% 2",
              "display_name": "Unsafe.AI_Score_95% 2",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink 2",
              "display_name": "JS:Trojan.HideLink 2",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Application.BitCoinMiner",
              "display_name": "Application.BitCoinMiner",
              "target": null
            },
            {
              "id": "WebToolbar.Asparnet",
              "display_name": "WebToolbar.Asparnet",
              "target": null
            },
            {
              "id": "W32.HfsAutoB",
              "display_name": "W32.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Application.Deceptor",
              "display_name": "Application.Deceptor",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "HEUR:Hoax.PCFixer",
              "display_name": "HEUR:Hoax.PCFixer",
              "target": null
            },
            {
              "id": "Gen:Variant.Jacard",
              "display_name": "Gen:Variant.Jacard",
              "target": null
            },
            {
              "id": "Tool.Patcher",
              "display_name": "Tool.Patcher",
              "target": null
            },
            {
              "id": "Trojan.Khalesi 2\tAdware 2",
              "display_name": "Trojan.Khalesi 2\tAdware 2",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_94%",
              "display_name": "Unsafe.AI_Score_94%",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Warezov.gen3",
              "display_name": "Warezov.gen3",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Nemucod.21C8",
              "display_name": "Nemucod.21C8",
              "target": null
            },
            {
              "id": "Asparnet.P",
              "display_name": "Asparnet.P",
              "target": null
            },
            {
              "id": "InstallCore.Gen7",
              "display_name": "InstallCore.Gen7",
              "target": null
            },
            {
              "id": "CsQKHtaAI",
              "display_name": "CsQKHtaAI",
              "target": null
            },
            {
              "id": "Clicker.VB",
              "display_name": "Clicker.VB",
              "target": null
            },
            {
              "id": "Exploit.Zip.Heuristic",
              "display_name": "Exploit.Zip.Heuristic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GandCrab",
              "display_name": "Trojan.Ransom.GandCrab",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "ScrInject.eric",
              "display_name": "ScrInject.eric",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Diztakun",
              "display_name": "HEUR:Trojan.Diztakun",
              "target": null
            },
            {
              "id": "Agent.OCJ",
              "display_name": "Agent.OCJ",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Hacktool.Crack",
              "display_name": "Hacktool.Crack",
              "target": null
            },
            {
              "id": "Backdoor.DTR.15",
              "display_name": "Backdoor.DTR.15",
              "target": null
            },
            {
              "id": "Freemake.A potentially unwanted",
              "display_name": "Freemake.A potentially unwanted",
              "target": null
            },
            {
              "id": "Absolute Uninstaller",
              "display_name": "Absolute Uninstaller",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "Trojan.Small",
              "display_name": "Trojan.Small",
              "target": null
            },
            {
              "id": "HackTool.Crack",
              "display_name": "HackTool.Crack",
              "target": null
            },
            {
              "id": "Generic.Application.JS.Sobrab.1",
              "display_name": "Generic.Application.JS.Sobrab.1",
              "target": null
            },
            {
              "id": "Trojan.Rozena",
              "display_name": "Trojan.Rozena",
              "target": null
            },
            {
              "id": "Trojan.Downloader",
              "display_name": "Trojan.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Bayrob",
              "display_name": "Trojan.Bayrob",
              "target": null
            },
            {
              "id": "Adware.OxyPumper",
              "display_name": "Adware.OxyPumper",
              "target": null
            },
            {
              "id": "Worm.Chir",
              "display_name": "Worm.Chir",
              "target": null
            },
            {
              "id": "Trojan.Linux.Generic",
              "display_name": "Trojan.Linux.Generic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Boxter.819",
              "display_name": "Heur.BZC.YAX.Boxter.819",
              "target": null
            },
            {
              "id": "Faceliker.D",
              "display_name": "Faceliker.D",
              "target": null
            },
            {
              "id": "Adware",
              "display_name": "Adware",
              "target": null
            },
            {
              "id": "DeepScan:Generic.BrResMon.1",
              "display_name": "DeepScan:Generic.BrResMon.1",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "Trojan.Brsecmon",
              "display_name": "Trojan.Brsecmon",
              "target": null
            },
            {
              "id": "SigRiskware.LespeedTechnologyLtd",
              "display_name": "SigRiskware.LespeedTechnologyLtd",
              "target": null
            },
            {
              "id": "Doplik.J",
              "display_name": "Doplik.J",
              "target": null
            },
            {
              "id": "Backdoor.Nhopro",
              "display_name": "Backdoor.Nhopro",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.32515",
              "display_name": "Gen:NN.ZemsilF.32515",
              "target": null
            },
            {
              "id": "Downware",
              "display_name": "Downware",
              "target": null
            },
            {
              "id": "MxResIcn.Heur",
              "display_name": "MxResIcn.Heur",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "Magazine phishing",
              "display_name": "Magazine phishing",
              "target": null
            },
            {
              "id": "ApplicUnwnt@#2n6\tIRS",
              "display_name": "ApplicUnwnt@#2n6\tIRS",
              "target": null
            },
            {
              "id": "TEL:Trojan:HTML/Phishing",
              "display_name": "TEL:Trojan:HTML/Phishing",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Trojan.GandCrypt",
              "display_name": "Trojan.GandCrypt",
              "target": null
            },
            {
              "id": "Redirector.AN",
              "display_name": "Redirector.AN",
              "target": null
            },
            {
              "id": "Agent.CUX.gen",
              "display_name": "Agent.CUX.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler",
              "display_name": "Gen:Variant.Application.Bundler",
              "target": null
            },
            {
              "id": "Downloader.Generic",
              "display_name": "Downloader.Generic",
              "target": null
            },
            {
              "id": "Trojan.ClipBanker",
              "display_name": "Trojan.ClipBanker",
              "target": null
            },
            {
              "id": "TrojanDropper.Autit",
              "display_name": "TrojanDropper.Autit",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "QVM05.1.08E5.Malware",
              "display_name": "QVM05.1.08E5.Malware",
              "target": null
            },
            {
              "id": "Trojan.CookiesStealer",
              "display_name": "Trojan.CookiesStealer",
              "target": null
            },
            {
              "id": "Agent.MU",
              "display_name": "Agent.MU",
              "target": null
            },
            {
              "id": "Wacatac.B",
              "display_name": "Wacatac.B",
              "target": null
            },
            {
              "id": "Dropper.Gen",
              "display_name": "Dropper.Gen",
              "target": null
            },
            {
              "id": "WiseCleaner.A potentially unwanted",
              "display_name": "WiseCleaner.A potentially unwanted",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34170",
              "display_name": "Gen:NN.ZemsilF.34170",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILHeracles",
              "display_name": "Gen:Variant.MSILHeracles",
              "target": null
            },
            {
              "id": "Trojan.DownLoader33",
              "display_name": "Trojan.DownLoader33",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Program.Freemake",
              "display_name": "Program.Freemake",
              "target": null
            },
            {
              "id": "Kryptik.dawvk",
              "display_name": "Kryptik.dawvk",
              "target": null
            },
            {
              "id": "AdwareSig [Adw]",
              "display_name": "AdwareSig [Adw]",
              "target": null
            },
            {
              "id": "Phishing JPMorgan Chase and Co.",
              "display_name": "Phishing JPMorgan Chase and Co.",
              "target": null
            },
            {
              "id": "Adware.BrowseFoxCRTD",
              "display_name": "Adware.BrowseFoxCRTD",
              "target": null
            },
            {
              "id": "Suspici.1F4405D1",
              "display_name": "Suspici.1F4405D1",
              "target": null
            },
            {
              "id": "PUA.Wombat",
              "display_name": "PUA.Wombat",
              "target": null
            },
            {
              "id": "AdWare.DealPly",
              "display_name": "AdWare.DealPly",
              "target": null
            },
            {
              "id": "Injector.CUAM",
              "display_name": "Injector.CUAM",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "Troj_Gen.F04IE00CI19",
              "display_name": "Troj_Gen.F04IE00CI19",
              "target": null
            },
            {
              "id": "Worm.Autorun",
              "display_name": "Worm.Autorun",
              "target": null
            },
            {
              "id": "Worm.Boychi",
              "display_name": "Worm.Boychi",
              "target": null
            },
            {
              "id": "Worm.Allaple",
              "display_name": "Worm.Allaple",
              "target": null
            },
            {
              "id": "CVE-2014-3153",
              "display_name": "CVE-2014-3153",
              "target": null
            },
            {
              "id": "BehavesLike.ICLoader",
              "display_name": "BehavesLike.ICLoader",
              "target": null
            },
            {
              "id": "BScope.Backdoor",
              "display_name": "BScope.Backdoor",
              "target": null
            },
            {
              "id": "Trojan.WIN32.PDF.Alien",
              "display_name": "Trojan.WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "PUP.Systweak",
              "display_name": "PUP.Systweak",
              "target": null
            },
            {
              "id": "Sabsik.FL.B",
              "display_name": "Sabsik.FL.B",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Gen:Variant.Tedy HackTool.VulnDriver",
              "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
              "target": null
            },
            {
              "id": "Backdoor.Predator",
              "display_name": "Backdoor.Predator",
              "target": null
            },
            {
              "id": "Kryptik.GKQR",
              "display_name": "Kryptik.GKQR",
              "target": null
            },
            {
              "id": "DarkKomet.ife",
              "display_name": "DarkKomet.ife",
              "target": null
            },
            {
              "id": "BehavesLike.Downloader",
              "display_name": "BehavesLike.Downloader",
              "target": null
            },
            {
              "id": "Trojan.JS.Iframe",
              "display_name": "Trojan.JS.Iframe",
              "target": null
            },
            {
              "id": "InstallCore.NP",
              "display_name": "InstallCore.NP",
              "target": null
            },
            {
              "id": "Generic.JS.BlackHole",
              "display_name": "Generic.JS.BlackHole",
              "target": null
            },
            {
              "id": "Dropper.Wanna",
              "display_name": "Dropper.Wanna",
              "target": null
            },
            {
              "id": "Remote Utilities",
              "display_name": "Remote Utilities",
              "target": null
            },
            {
              "id": "W32.InstallCore.AGX",
              "display_name": "W32.InstallCore.AGX",
              "target": null
            },
            {
              "id": "NetTool.RemoteExec",
              "display_name": "NetTool.RemoteExec",
              "target": null
            },
            {
              "id": "Bondat.A",
              "display_name": "Bondat.A",
              "target": null
            },
            {
              "id": "VM201.0.B70B.Malware",
              "display_name": "VM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "Infected.WebPage",
              "display_name": "Infected.WebPage",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Script",
              "display_name": "HEUR:Exploit.Script",
              "target": null
            },
            {
              "id": "BScope.TrojanDownloader",
              "display_name": "BScope.TrojanDownloader",
              "target": null
            },
            {
              "id": "HTML:RedirBA",
              "display_name": "HTML:RedirBA",
              "target": null
            },
            {
              "id": "Trojan.BAT.Qhost",
              "display_name": "Trojan.BAT.Qhost",
              "target": null
            },
            {
              "id": "HTML:RedirME",
              "display_name": "HTML:RedirME",
              "target": null
            },
            {
              "id": "TrojWare.JS.AdWare.Agent",
              "display_name": "TrojWare.JS.AdWare.Agent",
              "target": null
            },
            {
              "id": "Packed.Dico",
              "display_name": "Packed.Dico",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1602.001",
              "name": "SNMP (MIB Dump)",
              "display_name": "T1602.001 - SNMP (MIB Dump)"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653bf3b076e4dbcd0c099992",
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1695,
            "FileHash-SHA1": 756,
            "FileHash-SHA256": 2029,
            "domain": 290,
            "URL": 1854,
            "hostname": 568,
            "CVE": 5
          },
          "indicator_count": 7197,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "876 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a50c4487060d52346fd",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:54:55.973000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a8048e6a285461c4a5d",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:55:42.972000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f147a7e55dd916fe9e3e2",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-30T02:27:06.140000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652b2a8048e6a285461c4a5d",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "650a0b7c9a6b3c5d0a2a3960",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "Link: apple.instagram.com \nQuasar is a lightweight, publicly available open-source Remote Access Trojan (RAT). Used by a variety of attackers.  Typically packed to make analysis of the source demanding.\nAccount appears to have been breached, operational in dark web. Dead host.",
          "modified": "2023-10-19T14:04:37.381000",
          "created": "2023-09-19T20:58:36.137000",
          "tags": [
            "contacted",
            "threat roundup",
            "execution",
            "ssl certificate",
            "dark web",
            "crypto threat",
            "resolutions",
            "referrer",
            "stealer",
            "quasar",
            "asyncrat",
            "error",
            "social engineering",
            "iPhone phishing",
            "Apple phishing",
            "email phishing",
            "emotet",
            "remote",
            "attacks"
          ],
          "references": [
            "Alienvault OTX",
            "Data Analysis",
            "Online Research",
            "WebTools"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "India"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/AsyncRAT",
              "display_name": "Backdoor:MSIL/AsyncRAT",
              "target": "/malware/Backdoor:MSIL/AsyncRAT"
            },
            {
              "id": "Backdoor:MSIL/QuasarRat",
              "display_name": "Backdoor:MSIL/QuasarRat",
              "target": "/malware/Backdoor:MSIL/QuasarRat"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [
            "Media",
            "Social Media",
            "Technology",
            "Hacking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 5791,
            "URL": 11513,
            "domain": 2317,
            "hostname": 3255,
            "CVE": 3
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "914 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220c81aaf6fddde0116569a",
          "name": "Democrats.org",
          "description": "",
          "modified": "2022-04-02T00:04:50.405000",
          "created": "2022-03-03T13:52:26.328000",
          "tags": [
            "date",
            "dns replication"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 17938,
            "hostname": 3860,
            "domain": 3501,
            "FileHash-SHA256": 3114,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1479 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6213f8adc8cfe3f681957ed1",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2022-03-23T00:02:04.887000",
          "created": "2022-02-21T20:40:13.490000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1620,
            "URL": 6563,
            "FileHash-SHA256": 1950,
            "domain": 900,
            "CVE": 1
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 409,
          "modified_text": "1489 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0",
        "Data Analysis",
        "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
        "Alienvault OTX",
        "Online Research",
        "WebTools"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "[Unnamed group]"
          ],
          "malware_families": [
            "Downware",
            "Gen:nn.zemsilf.32515",
            "Application.deceptor",
            "Scrinject.b",
            "Hoax.deceptpcclean",
            "Redirector.an",
            "Pe.heur",
            "Adwaresig [adw]",
            "Goldfinder",
            "Backdoor.nhopro",
            "Trojanbanker.banbra",
            "Gen:heur.msil.inject",
            "Pup.systweak",
            "Bscope.trojan",
            "Hacktool.crack",
            "Trojan.win32.pdf.alien",
            "Maltiverse",
            "Phishing jpmorgan chase and co.",
            "Heur.bzc.yax.boxter.819",
            "Tool.patcher",
            "Dropper.trojan.agent",
            "Trojan.bat.qhost",
            "Gen:variant.application.bundler",
            "Wisecleaner.a potentially unwanted",
            "Heur:hoax.pcfixer",
            "Packed.dico",
            "Xtreme rat",
            "Heur:trojan.diztakun",
            "Deepscan:generic.brresmon.1",
            "Gen:nn.zemsilf.34170",
            "Html:redirba",
            "Trojan.linux.generic",
            "Trojan.bayrob",
            "Injector.cuam",
            "Exploit.zip.heuristic",
            "Agent.mu",
            "Trojan.wisdomeyes.16070401.9500",
            "Kryptik.gkqr",
            "Trojware.js.adware.agent",
            "Magazine phishing",
            "Behaveslike.icloader",
            "Wacatac",
            "Gen:variant.jacard",
            "Agent.ocj",
            "Html:script",
            "Azorult",
            "Trojan.rozena",
            "Adware.oxypumper",
            "Adware.kuzitui",
            "Suspici.1f4405d1",
            "Worm.allaple",
            "Webtoolbar",
            "Applicunwnt@#2n6\tirs",
            "Gen:variant.application.bundler.downloadguide",
            "Riskware.crack",
            "Tel:trojan:html/phishing",
            "Generic.js.blackhole",
            "Nemucod.21c8",
            "Sabsik.fl.b",
            "Mimikatz",
            "Virus.sality",
            "Backdoor.predator",
            "Trojan:win32/xtrat",
            "Blacknet rat",
            "Trojan.js.iframe",
            "Trojandropper.autit",
            "Trojan.ransom.generickd",
            "Trojan.brsecmon",
            "Unsafe.ai_score_95% 2",
            "Trojan.downloader",
            "Mxresicn.heur",
            "Wacatac.b",
            "Kryptik.dawvk",
            "Hacktool.cheatengine",
            "Worm.boychi",
            "Trojan.hotkeychick",
            "Faceliker.d",
            "Ml.attribute",
            "Tsgeneric",
            "Warezov.gen3",
            "Scrinject.eric",
            "Backdoor.dtr.15",
            "Sibot",
            "Agen.1045143",
            "Trojan.khalesi 2\tadware 2",
            "Trojan:win32/tiggre",
            "Remote utilities",
            "Quasar rat",
            "Application.bitcoinminer",
            "Trojan.otnr",
            "Bscope.adware.msil",
            "Cve-2014-3153",
            "Backdoor:msil/asyncrat",
            "Nettool.remoteexec",
            "Cobalt strike",
            "Unsafe.ai_score_94%",
            "Gen:heur.msil.androm",
            "Hacktool.bruteforce",
            "Trojan.ransom.gandcrab",
            "Trojan.msil",
            "Googletoolbar",
            "Gen:variant.bulz",
            "Msil_bladabindi.g.gen",
            "Application.auslogics",
            "Worm.chir",
            "Backdoor:msil/quasarrat",
            "Redline stealer",
            "Webtoolbar.asparnet",
            "Adware.dealply",
            "Emotet",
            "Vm201.0.b70b.malware",
            "Riskware.netfilter",
            "Zfaoz",
            "Absolute uninstaller",
            "Downloader.generic",
            "Malicious.f01f67",
            "Gen:variant.ursu",
            "Mediamagnet",
            "Doplik.j",
            "Gen:nn.zexaf.34090",
            "Gen:variant.tedy hacktool.vulndriver",
            "Behaveslike.downloader",
            "Agent.cux.gen",
            "Adware",
            "Trojan.downloader33",
            "Program.freemake",
            "Asparnet.p",
            "Bondat.a",
            "Zbot",
            "Driverreviver.a potentially unwanted",
            "Gen:variant.msilheracles",
            "Dropper.gen",
            "Bscope.trojandownloader",
            "Riskware.hacktool.agent",
            "Csqkhtaai",
            "Bscope.backdoor",
            "Backdoor.androm",
            "Cve exploits",
            "Trojan.small",
            "Mimikatz - s0002",
            "Installcore.gen7",
            "Downldr.gen",
            "Clicker.vb",
            "Trojanspy",
            "Dropper.wanna",
            "Gen:variant.symmi",
            "Downloader.opencandy",
            "Vdehu.a",
            "Trojan.clipbanker",
            "Heur:exploit.script",
            "Trojan.gandcrypt",
            "Generic.application.js.sobrab.1",
            "Generic.asmalws",
            "Packed.themida",
            "Js:trojan.hidelink 2",
            "Adware.browsefoxcrtd",
            "Sigriskware.lespeedtechnologyltd",
            "Pua.wombat",
            "Vb:trojan.valyria",
            "W32.installcore.agx",
            "Js:trojan.clicker",
            "Installcore.np",
            "W32.malware",
            "Goldmax - s0588",
            "Unruy",
            "Freemake.a potentially unwanted",
            "Trojan.cookiesstealer",
            "Wisdomeyes.16070401.9500",
            "Qvm05.1.08e5.malware",
            "Infected.webpage",
            "Hw32.packed",
            "Html:redirme",
            "Troj_gen.f04ie00ci19",
            "Worm.autorun",
            "Darkkomet.ife",
            "W32.hfsautob",
            "Agen.1144657"
          ],
          "industries": [
            "Technology",
            "Government",
            "Social media",
            "Hacking",
            "Media"
          ],
          "unique_indicators": 88833
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/taneda.xyz",
    "whois": "http://whois.domaintools.com/taneda.xyz",
    "domain": "taneda.xyz",
    "hostname": "sync.taneda.xyz"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 14,
  "pulses": [
    {
      "id": "687f0f210ec1de4316b22522",
      "name": "Strange Medical Facility with Overt Bad Actors Spying on Disabled",
      "description": "Strange Medical Facility with Overt Bad Actors already Spying on Disabled. Everything including bathroom is monitored.\nfounderintech.com\nwww.galbutfamilyfoundation.com\t\nwpengine.com\t\nhttps://foundry2sdbl.dvr.dn2.n-helix.com\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\npegasusthruster.com\t\nhttps://www.pegasusthruster.com/\t\nsmtp.pegasustech.net\nhttp://pegasusthruster.com/shoppegasus/includes/att",
      "modified": "2025-08-21T03:02:43.704000",
      "created": "2025-07-22T04:10:09.158000",
      "tags": [
        "date",
        "submit url",
        "analysis",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "asn as13335",
        "whois registrar",
        "creation date",
        "extraction",
        "data",
        "extri",
        "include review",
        "iocs",
        "data upload",
        "united",
        "unknown aaaa",
        "search",
        "showing",
        "moved",
        "a domains",
        "record value",
        "body"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6560,
        "FileHash-MD5": 121,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 3989,
        "domain": 1616,
        "hostname": 1876,
        "email": 3,
        "CVE": 2
      },
      "indicator_count": 14292,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "242 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a958f96f9b29641ea020",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:03:20.219000",
      "created": "2023-12-06T17:03:20.219000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a927b24b94cdd5d344d1",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:02:31.854000",
      "created": "2023-12-06T17:02:31.854000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a581b1024ea61979da96",
      "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
      "description": "",
      "modified": "2023-12-06T16:46:57.782000",
      "created": "2023-12-06T16:46:57.782000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 5791,
        "hostname": 3255,
        "domain": 2317,
        "FileHash-MD5": 44,
        "FileHash-SHA1": 34,
        "URL": 11513
      },
      "indicator_count": 22957,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570800373899fd03e2e49db",
      "name": "Democrats.org",
      "description": "",
      "modified": "2023-12-06T14:06:59.250000",
      "created": "2023-12-06T14:06:59.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3114,
        "domain": 3501,
        "hostname": 3860,
        "URL": 17938,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707ec3c760eea3873db672",
      "name": "BernieSanders.com (Pt.3)",
      "description": "",
      "modified": "2023-12-06T14:01:39.582000",
      "created": "2023-12-06T14:01:39.582000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 1950,
        "hostname": 1620,
        "domain": 900,
        "URL": 6563
      },
      "indicator_count": 11034,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653bf3b076e4dbcd0c099992",
      "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
      "description": "DeepScan run (absolute overkill). I witnessed excessive data use, device is completely practically unusable, many black pages, denial of most services. CNC. Browser bar became a malicious app that returns 0 searches. Attack directed towards my devices.\nNo stone left unturned. Passwords taken. Apps installed to device Covered can on device takes pictures/flash at will. Evasive. Very talented hackers.  \nBravo! Very intrusive. Constantly attacking.\nTarget: Tsara Brashears and researcher",
      "modified": "2023-11-26T14:04:04.692000",
      "created": "2023-10-27T17:30:24.926000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "resolutions",
        "referrer",
        "collections",
        "contacted",
        "efr1",
        "parent domain",
        "amazon 02",
        "metro",
        "crypto",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malware",
        "alexa top",
        "million",
        "malicious url",
        "malware site",
        "malicious site",
        "opencandy",
        "riskware",
        "unsafe",
        "phishing",
        "zbot",
        "team",
        "exploit",
        "agent",
        "mimikatz",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "downldr",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "artemis",
        "blacknet rat",
        "stealer",
        "trojanspy",
        "blacklist https",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "count blacklist",
        "tag count",
        "tsara brashears",
        "self",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "whois record",
        "contacted urls",
        "siblings domain",
        "execution",
        "goldmax",
        "goldfinder",
        "sibot",
        "emotet",
        "united",
        "phishing site",
        "maltiverse",
        "adware",
        "phishtank",
        "xtrat",
        "xrat",
        "redline stealer",
        "xtreme",
        "crack",
        "genkryptik",
        "deepscan",
        "win64",
        "quasar rat",
        "fareit",
        "downloader",
        "trojan",
        "alexa",
        "iframe",
        "cve201711882",
        "phish",
        "genpack",
        "suspicious",
        "magazine",
        "applicunwnt",
        "cobalt strike",
        "malicious",
        "pattern match",
        "file",
        "web open",
        "font format",
        "truetype",
        "indicator",
        "windows nt",
        "ascii text",
        "mitre att",
        "ck id",
        "date",
        "unknown",
        "hybrid",
        "accept",
        "local",
        "stream",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "pmejdjsu12",
        "Royal Bank of Scotland",
        "Phishing Bank of America Corporation",
        "Phishing Netflix",
        "Phishing Wells Fargo",
        "Phishing RuneScape",
        "Phishing Internal Revenue Service",
        "Phtarget unspecified phishing",
        "PAYPAL phishing",
        "Phishing Indeed",
        "Phishing eBay, Inc",
        "PhisSafe",
        "mobigame",
        "Phishing Facebook",
        "remote",
        "mitm",
        "tower",
        "worm",
        "firm",
        "privilege",
        "attacker",
        "monitoring",
        "cyber threat",
        "apple",
        "illegal",
        "DNS_PROBE_STARTED",
        "insurance",
        "revenge",
        "legal entities",
        "https://boxofporn.com"
      ],
      "references": [],
      "public": 1,
      "adversary": "[Unnamed group]",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan.Hotkeychick",
          "display_name": "Trojan.Hotkeychick",
          "target": null
        },
        {
          "id": "CVE Exploits",
          "display_name": "CVE Exploits",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Virus.Sality",
          "display_name": "Virus.Sality",
          "target": null
        },
        {
          "id": "W32.Malware",
          "display_name": "W32.Malware",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "Trojan.OTNR",
          "display_name": "Trojan.OTNR",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Mimikatz - S0002",
          "display_name": "Mimikatz - S0002",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "Downloader.OpenCandy",
          "display_name": "Downloader.OpenCandy",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "GoogleToolbar",
          "display_name": "GoogleToolbar",
          "target": null
        },
        {
          "id": "BScope.Adware.MSIL",
          "display_name": "BScope.Adware.MSIL",
          "target": null
        },
        {
          "id": "Application.Auslogics",
          "display_name": "Application.Auslogics",
          "target": null
        },
        {
          "id": "PE.Heur",
          "display_name": "PE.Heur",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler.DownloadGuide",
          "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
          "target": null
        },
        {
          "id": "Trojan:Win32/Xtrat",
          "display_name": "Trojan:Win32/Xtrat",
          "target": "/malware/Trojan:Win32/Xtrat"
        },
        {
          "id": "Xtreme RAT",
          "display_name": "Xtreme RAT",
          "target": null
        },
        {
          "id": "ML.Attribute",
          "display_name": "ML.Attribute",
          "target": null
        },
        {
          "id": "AGEN.1045143",
          "display_name": "AGEN.1045143",
          "target": null
        },
        {
          "id": "Hoax.DeceptPCClean",
          "display_name": "Hoax.DeceptPCClean",
          "target": null
        },
        {
          "id": "Packed.Themida",
          "display_name": "Packed.Themida",
          "target": null
        },
        {
          "id": "MSIL_Bladabindi.G.gen",
          "display_name": "MSIL_Bladabindi.G.gen",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.34090",
          "display_name": "Gen:NN.ZexaF.34090",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_95% 2",
          "display_name": "Unsafe.AI_Score_95% 2",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink 2",
          "display_name": "JS:Trojan.HideLink 2",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Application.BitCoinMiner",
          "display_name": "Application.BitCoinMiner",
          "target": null
        },
        {
          "id": "WebToolbar.Asparnet",
          "display_name": "WebToolbar.Asparnet",
          "target": null
        },
        {
          "id": "W32.HfsAutoB",
          "display_name": "W32.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Application.Deceptor",
          "display_name": "Application.Deceptor",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "HEUR:Hoax.PCFixer",
          "display_name": "HEUR:Hoax.PCFixer",
          "target": null
        },
        {
          "id": "Gen:Variant.Jacard",
          "display_name": "Gen:Variant.Jacard",
          "target": null
        },
        {
          "id": "Tool.Patcher",
          "display_name": "Tool.Patcher",
          "target": null
        },
        {
          "id": "Trojan.Khalesi 2\tAdware 2",
          "display_name": "Trojan.Khalesi 2\tAdware 2",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_94%",
          "display_name": "Unsafe.AI_Score_94%",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Warezov.gen3",
          "display_name": "Warezov.gen3",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Nemucod.21C8",
          "display_name": "Nemucod.21C8",
          "target": null
        },
        {
          "id": "Asparnet.P",
          "display_name": "Asparnet.P",
          "target": null
        },
        {
          "id": "InstallCore.Gen7",
          "display_name": "InstallCore.Gen7",
          "target": null
        },
        {
          "id": "CsQKHtaAI",
          "display_name": "CsQKHtaAI",
          "target": null
        },
        {
          "id": "Clicker.VB",
          "display_name": "Clicker.VB",
          "target": null
        },
        {
          "id": "Exploit.Zip.Heuristic",
          "display_name": "Exploit.Zip.Heuristic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GandCrab",
          "display_name": "Trojan.Ransom.GandCrab",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "ScrInject.eric",
          "display_name": "ScrInject.eric",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Diztakun",
          "display_name": "HEUR:Trojan.Diztakun",
          "target": null
        },
        {
          "id": "Agent.OCJ",
          "display_name": "Agent.OCJ",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Hacktool.Crack",
          "display_name": "Hacktool.Crack",
          "target": null
        },
        {
          "id": "Backdoor.DTR.15",
          "display_name": "Backdoor.DTR.15",
          "target": null
        },
        {
          "id": "Freemake.A potentially unwanted",
          "display_name": "Freemake.A potentially unwanted",
          "target": null
        },
        {
          "id": "Absolute Uninstaller",
          "display_name": "Absolute Uninstaller",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "Trojan.Small",
          "display_name": "Trojan.Small",
          "target": null
        },
        {
          "id": "HackTool.Crack",
          "display_name": "HackTool.Crack",
          "target": null
        },
        {
          "id": "Generic.Application.JS.Sobrab.1",
          "display_name": "Generic.Application.JS.Sobrab.1",
          "target": null
        },
        {
          "id": "Trojan.Rozena",
          "display_name": "Trojan.Rozena",
          "target": null
        },
        {
          "id": "Trojan.Downloader",
          "display_name": "Trojan.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Bayrob",
          "display_name": "Trojan.Bayrob",
          "target": null
        },
        {
          "id": "Adware.OxyPumper",
          "display_name": "Adware.OxyPumper",
          "target": null
        },
        {
          "id": "Worm.Chir",
          "display_name": "Worm.Chir",
          "target": null
        },
        {
          "id": "Trojan.Linux.Generic",
          "display_name": "Trojan.Linux.Generic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Boxter.819",
          "display_name": "Heur.BZC.YAX.Boxter.819",
          "target": null
        },
        {
          "id": "Faceliker.D",
          "display_name": "Faceliker.D",
          "target": null
        },
        {
          "id": "Adware",
          "display_name": "Adware",
          "target": null
        },
        {
          "id": "DeepScan:Generic.BrResMon.1",
          "display_name": "DeepScan:Generic.BrResMon.1",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "Trojan.Brsecmon",
          "display_name": "Trojan.Brsecmon",
          "target": null
        },
        {
          "id": "SigRiskware.LespeedTechnologyLtd",
          "display_name": "SigRiskware.LespeedTechnologyLtd",
          "target": null
        },
        {
          "id": "Doplik.J",
          "display_name": "Doplik.J",
          "target": null
        },
        {
          "id": "Backdoor.Nhopro",
          "display_name": "Backdoor.Nhopro",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.32515",
          "display_name": "Gen:NN.ZemsilF.32515",
          "target": null
        },
        {
          "id": "Downware",
          "display_name": "Downware",
          "target": null
        },
        {
          "id": "MxResIcn.Heur",
          "display_name": "MxResIcn.Heur",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "Magazine phishing",
          "display_name": "Magazine phishing",
          "target": null
        },
        {
          "id": "ApplicUnwnt@#2n6\tIRS",
          "display_name": "ApplicUnwnt@#2n6\tIRS",
          "target": null
        },
        {
          "id": "TEL:Trojan:HTML/Phishing",
          "display_name": "TEL:Trojan:HTML/Phishing",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Trojan.GandCrypt",
          "display_name": "Trojan.GandCrypt",
          "target": null
        },
        {
          "id": "Redirector.AN",
          "display_name": "Redirector.AN",
          "target": null
        },
        {
          "id": "Agent.CUX.gen",
          "display_name": "Agent.CUX.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler",
          "display_name": "Gen:Variant.Application.Bundler",
          "target": null
        },
        {
          "id": "Downloader.Generic",
          "display_name": "Downloader.Generic",
          "target": null
        },
        {
          "id": "Trojan.ClipBanker",
          "display_name": "Trojan.ClipBanker",
          "target": null
        },
        {
          "id": "TrojanDropper.Autit",
          "display_name": "TrojanDropper.Autit",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "QVM05.1.08E5.Malware",
          "display_name": "QVM05.1.08E5.Malware",
          "target": null
        },
        {
          "id": "Trojan.CookiesStealer",
          "display_name": "Trojan.CookiesStealer",
          "target": null
        },
        {
          "id": "Agent.MU",
          "display_name": "Agent.MU",
          "target": null
        },
        {
          "id": "Wacatac.B",
          "display_name": "Wacatac.B",
          "target": null
        },
        {
          "id": "Dropper.Gen",
          "display_name": "Dropper.Gen",
          "target": null
        },
        {
          "id": "WiseCleaner.A potentially unwanted",
          "display_name": "WiseCleaner.A potentially unwanted",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34170",
          "display_name": "Gen:NN.ZemsilF.34170",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILHeracles",
          "display_name": "Gen:Variant.MSILHeracles",
          "target": null
        },
        {
          "id": "Trojan.DownLoader33",
          "display_name": "Trojan.DownLoader33",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Program.Freemake",
          "display_name": "Program.Freemake",
          "target": null
        },
        {
          "id": "Kryptik.dawvk",
          "display_name": "Kryptik.dawvk",
          "target": null
        },
        {
          "id": "AdwareSig [Adw]",
          "display_name": "AdwareSig [Adw]",
          "target": null
        },
        {
          "id": "Phishing JPMorgan Chase and Co.",
          "display_name": "Phishing JPMorgan Chase and Co.",
          "target": null
        },
        {
          "id": "Adware.BrowseFoxCRTD",
          "display_name": "Adware.BrowseFoxCRTD",
          "target": null
        },
        {
          "id": "Suspici.1F4405D1",
          "display_name": "Suspici.1F4405D1",
          "target": null
        },
        {
          "id": "PUA.Wombat",
          "display_name": "PUA.Wombat",
          "target": null
        },
        {
          "id": "AdWare.DealPly",
          "display_name": "AdWare.DealPly",
          "target": null
        },
        {
          "id": "Injector.CUAM",
          "display_name": "Injector.CUAM",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "Troj_Gen.F04IE00CI19",
          "display_name": "Troj_Gen.F04IE00CI19",
          "target": null
        },
        {
          "id": "Worm.Autorun",
          "display_name": "Worm.Autorun",
          "target": null
        },
        {
          "id": "Worm.Boychi",
          "display_name": "Worm.Boychi",
          "target": null
        },
        {
          "id": "Worm.Allaple",
          "display_name": "Worm.Allaple",
          "target": null
        },
        {
          "id": "CVE-2014-3153",
          "display_name": "CVE-2014-3153",
          "target": null
        },
        {
          "id": "BehavesLike.ICLoader",
          "display_name": "BehavesLike.ICLoader",
          "target": null
        },
        {
          "id": "BScope.Backdoor",
          "display_name": "BScope.Backdoor",
          "target": null
        },
        {
          "id": "Trojan.WIN32.PDF.Alien",
          "display_name": "Trojan.WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "PUP.Systweak",
          "display_name": "PUP.Systweak",
          "target": null
        },
        {
          "id": "Sabsik.FL.B",
          "display_name": "Sabsik.FL.B",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Gen:Variant.Tedy HackTool.VulnDriver",
          "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
          "target": null
        },
        {
          "id": "Backdoor.Predator",
          "display_name": "Backdoor.Predator",
          "target": null
        },
        {
          "id": "Kryptik.GKQR",
          "display_name": "Kryptik.GKQR",
          "target": null
        },
        {
          "id": "DarkKomet.ife",
          "display_name": "DarkKomet.ife",
          "target": null
        },
        {
          "id": "BehavesLike.Downloader",
          "display_name": "BehavesLike.Downloader",
          "target": null
        },
        {
          "id": "Trojan.JS.Iframe",
          "display_name": "Trojan.JS.Iframe",
          "target": null
        },
        {
          "id": "InstallCore.NP",
          "display_name": "InstallCore.NP",
          "target": null
        },
        {
          "id": "Generic.JS.BlackHole",
          "display_name": "Generic.JS.BlackHole",
          "target": null
        },
        {
          "id": "Dropper.Wanna",
          "display_name": "Dropper.Wanna",
          "target": null
        },
        {
          "id": "Remote Utilities",
          "display_name": "Remote Utilities",
          "target": null
        },
        {
          "id": "W32.InstallCore.AGX",
          "display_name": "W32.InstallCore.AGX",
          "target": null
        },
        {
          "id": "NetTool.RemoteExec",
          "display_name": "NetTool.RemoteExec",
          "target": null
        },
        {
          "id": "Bondat.A",
          "display_name": "Bondat.A",
          "target": null
        },
        {
          "id": "VM201.0.B70B.Malware",
          "display_name": "VM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "Infected.WebPage",
          "display_name": "Infected.WebPage",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Script",
          "display_name": "HEUR:Exploit.Script",
          "target": null
        },
        {
          "id": "BScope.TrojanDownloader",
          "display_name": "BScope.TrojanDownloader",
          "target": null
        },
        {
          "id": "HTML:RedirBA",
          "display_name": "HTML:RedirBA",
          "target": null
        },
        {
          "id": "Trojan.BAT.Qhost",
          "display_name": "Trojan.BAT.Qhost",
          "target": null
        },
        {
          "id": "HTML:RedirME",
          "display_name": "HTML:RedirME",
          "target": null
        },
        {
          "id": "TrojWare.JS.AdWare.Agent",
          "display_name": "TrojWare.JS.AdWare.Agent",
          "target": null
        },
        {
          "id": "Packed.Dico",
          "display_name": "Packed.Dico",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1602.001",
          "name": "SNMP (MIB Dump)",
          "display_name": "T1602.001 - SNMP (MIB Dump)"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 34,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1695,
        "FileHash-SHA1": 756,
        "FileHash-SHA256": 2029,
        "domain": 290,
        "URL": 1854,
        "hostname": 568,
        "CVE": 5
      },
      "indicator_count": 7197,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "876 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f09785f9ee8aebca2a667",
      "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
      "description": "",
      "modified": "2023-11-26T14:04:04.692000",
      "created": "2023-10-30T01:40:08.022000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "resolutions",
        "referrer",
        "collections",
        "contacted",
        "efr1",
        "parent domain",
        "amazon 02",
        "metro",
        "crypto",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malware",
        "alexa top",
        "million",
        "malicious url",
        "malware site",
        "malicious site",
        "opencandy",
        "riskware",
        "unsafe",
        "phishing",
        "zbot",
        "team",
        "exploit",
        "agent",
        "mimikatz",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "downldr",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "artemis",
        "blacknet rat",
        "stealer",
        "trojanspy",
        "blacklist https",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "count blacklist",
        "tag count",
        "tsara brashears",
        "self",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "whois record",
        "contacted urls",
        "siblings domain",
        "execution",
        "goldmax",
        "goldfinder",
        "sibot",
        "emotet",
        "united",
        "phishing site",
        "maltiverse",
        "adware",
        "phishtank",
        "xtrat",
        "xrat",
        "redline stealer",
        "xtreme",
        "crack",
        "genkryptik",
        "deepscan",
        "win64",
        "quasar rat",
        "fareit",
        "downloader",
        "trojan",
        "alexa",
        "iframe",
        "cve201711882",
        "phish",
        "genpack",
        "suspicious",
        "magazine",
        "applicunwnt",
        "cobalt strike",
        "malicious",
        "pattern match",
        "file",
        "web open",
        "font format",
        "truetype",
        "indicator",
        "windows nt",
        "ascii text",
        "mitre att",
        "ck id",
        "date",
        "unknown",
        "hybrid",
        "accept",
        "local",
        "stream",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "pmejdjsu12",
        "Royal Bank of Scotland",
        "Phishing Bank of America Corporation",
        "Phishing Netflix",
        "Phishing Wells Fargo",
        "Phishing RuneScape",
        "Phishing Internal Revenue Service",
        "Phtarget unspecified phishing",
        "PAYPAL phishing",
        "Phishing Indeed",
        "Phishing eBay, Inc",
        "PhisSafe",
        "mobigame",
        "Phishing Facebook",
        "remote",
        "mitm",
        "tower",
        "worm",
        "firm",
        "privilege",
        "attacker",
        "monitoring",
        "cyber threat",
        "apple",
        "illegal",
        "DNS_PROBE_STARTED",
        "insurance",
        "revenge",
        "legal entities",
        "https://boxofporn.com"
      ],
      "references": [],
      "public": 1,
      "adversary": "[Unnamed group]",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan.Hotkeychick",
          "display_name": "Trojan.Hotkeychick",
          "target": null
        },
        {
          "id": "CVE Exploits",
          "display_name": "CVE Exploits",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Virus.Sality",
          "display_name": "Virus.Sality",
          "target": null
        },
        {
          "id": "W32.Malware",
          "display_name": "W32.Malware",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "Trojan.OTNR",
          "display_name": "Trojan.OTNR",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Mimikatz - S0002",
          "display_name": "Mimikatz - S0002",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "Downloader.OpenCandy",
          "display_name": "Downloader.OpenCandy",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "GoogleToolbar",
          "display_name": "GoogleToolbar",
          "target": null
        },
        {
          "id": "BScope.Adware.MSIL",
          "display_name": "BScope.Adware.MSIL",
          "target": null
        },
        {
          "id": "Application.Auslogics",
          "display_name": "Application.Auslogics",
          "target": null
        },
        {
          "id": "PE.Heur",
          "display_name": "PE.Heur",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler.DownloadGuide",
          "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
          "target": null
        },
        {
          "id": "Trojan:Win32/Xtrat",
          "display_name": "Trojan:Win32/Xtrat",
          "target": "/malware/Trojan:Win32/Xtrat"
        },
        {
          "id": "Xtreme RAT",
          "display_name": "Xtreme RAT",
          "target": null
        },
        {
          "id": "ML.Attribute",
          "display_name": "ML.Attribute",
          "target": null
        },
        {
          "id": "AGEN.1045143",
          "display_name": "AGEN.1045143",
          "target": null
        },
        {
          "id": "Hoax.DeceptPCClean",
          "display_name": "Hoax.DeceptPCClean",
          "target": null
        },
        {
          "id": "Packed.Themida",
          "display_name": "Packed.Themida",
          "target": null
        },
        {
          "id": "MSIL_Bladabindi.G.gen",
          "display_name": "MSIL_Bladabindi.G.gen",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.34090",
          "display_name": "Gen:NN.ZexaF.34090",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_95% 2",
          "display_name": "Unsafe.AI_Score_95% 2",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink 2",
          "display_name": "JS:Trojan.HideLink 2",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Application.BitCoinMiner",
          "display_name": "Application.BitCoinMiner",
          "target": null
        },
        {
          "id": "WebToolbar.Asparnet",
          "display_name": "WebToolbar.Asparnet",
          "target": null
        },
        {
          "id": "W32.HfsAutoB",
          "display_name": "W32.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Application.Deceptor",
          "display_name": "Application.Deceptor",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "HEUR:Hoax.PCFixer",
          "display_name": "HEUR:Hoax.PCFixer",
          "target": null
        },
        {
          "id": "Gen:Variant.Jacard",
          "display_name": "Gen:Variant.Jacard",
          "target": null
        },
        {
          "id": "Tool.Patcher",
          "display_name": "Tool.Patcher",
          "target": null
        },
        {
          "id": "Trojan.Khalesi 2\tAdware 2",
          "display_name": "Trojan.Khalesi 2\tAdware 2",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_94%",
          "display_name": "Unsafe.AI_Score_94%",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Warezov.gen3",
          "display_name": "Warezov.gen3",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Nemucod.21C8",
          "display_name": "Nemucod.21C8",
          "target": null
        },
        {
          "id": "Asparnet.P",
          "display_name": "Asparnet.P",
          "target": null
        },
        {
          "id": "InstallCore.Gen7",
          "display_name": "InstallCore.Gen7",
          "target": null
        },
        {
          "id": "CsQKHtaAI",
          "display_name": "CsQKHtaAI",
          "target": null
        },
        {
          "id": "Clicker.VB",
          "display_name": "Clicker.VB",
          "target": null
        },
        {
          "id": "Exploit.Zip.Heuristic",
          "display_name": "Exploit.Zip.Heuristic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GandCrab",
          "display_name": "Trojan.Ransom.GandCrab",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "ScrInject.eric",
          "display_name": "ScrInject.eric",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Diztakun",
          "display_name": "HEUR:Trojan.Diztakun",
          "target": null
        },
        {
          "id": "Agent.OCJ",
          "display_name": "Agent.OCJ",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Hacktool.Crack",
          "display_name": "Hacktool.Crack",
          "target": null
        },
        {
          "id": "Backdoor.DTR.15",
          "display_name": "Backdoor.DTR.15",
          "target": null
        },
        {
          "id": "Freemake.A potentially unwanted",
          "display_name": "Freemake.A potentially unwanted",
          "target": null
        },
        {
          "id": "Absolute Uninstaller",
          "display_name": "Absolute Uninstaller",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "Trojan.Small",
          "display_name": "Trojan.Small",
          "target": null
        },
        {
          "id": "HackTool.Crack",
          "display_name": "HackTool.Crack",
          "target": null
        },
        {
          "id": "Generic.Application.JS.Sobrab.1",
          "display_name": "Generic.Application.JS.Sobrab.1",
          "target": null
        },
        {
          "id": "Trojan.Rozena",
          "display_name": "Trojan.Rozena",
          "target": null
        },
        {
          "id": "Trojan.Downloader",
          "display_name": "Trojan.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Bayrob",
          "display_name": "Trojan.Bayrob",
          "target": null
        },
        {
          "id": "Adware.OxyPumper",
          "display_name": "Adware.OxyPumper",
          "target": null
        },
        {
          "id": "Worm.Chir",
          "display_name": "Worm.Chir",
          "target": null
        },
        {
          "id": "Trojan.Linux.Generic",
          "display_name": "Trojan.Linux.Generic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Boxter.819",
          "display_name": "Heur.BZC.YAX.Boxter.819",
          "target": null
        },
        {
          "id": "Faceliker.D",
          "display_name": "Faceliker.D",
          "target": null
        },
        {
          "id": "Adware",
          "display_name": "Adware",
          "target": null
        },
        {
          "id": "DeepScan:Generic.BrResMon.1",
          "display_name": "DeepScan:Generic.BrResMon.1",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "Trojan.Brsecmon",
          "display_name": "Trojan.Brsecmon",
          "target": null
        },
        {
          "id": "SigRiskware.LespeedTechnologyLtd",
          "display_name": "SigRiskware.LespeedTechnologyLtd",
          "target": null
        },
        {
          "id": "Doplik.J",
          "display_name": "Doplik.J",
          "target": null
        },
        {
          "id": "Backdoor.Nhopro",
          "display_name": "Backdoor.Nhopro",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.32515",
          "display_name": "Gen:NN.ZemsilF.32515",
          "target": null
        },
        {
          "id": "Downware",
          "display_name": "Downware",
          "target": null
        },
        {
          "id": "MxResIcn.Heur",
          "display_name": "MxResIcn.Heur",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "Magazine phishing",
          "display_name": "Magazine phishing",
          "target": null
        },
        {
          "id": "ApplicUnwnt@#2n6\tIRS",
          "display_name": "ApplicUnwnt@#2n6\tIRS",
          "target": null
        },
        {
          "id": "TEL:Trojan:HTML/Phishing",
          "display_name": "TEL:Trojan:HTML/Phishing",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Trojan.GandCrypt",
          "display_name": "Trojan.GandCrypt",
          "target": null
        },
        {
          "id": "Redirector.AN",
          "display_name": "Redirector.AN",
          "target": null
        },
        {
          "id": "Agent.CUX.gen",
          "display_name": "Agent.CUX.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler",
          "display_name": "Gen:Variant.Application.Bundler",
          "target": null
        },
        {
          "id": "Downloader.Generic",
          "display_name": "Downloader.Generic",
          "target": null
        },
        {
          "id": "Trojan.ClipBanker",
          "display_name": "Trojan.ClipBanker",
          "target": null
        },
        {
          "id": "TrojanDropper.Autit",
          "display_name": "TrojanDropper.Autit",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "QVM05.1.08E5.Malware",
          "display_name": "QVM05.1.08E5.Malware",
          "target": null
        },
        {
          "id": "Trojan.CookiesStealer",
          "display_name": "Trojan.CookiesStealer",
          "target": null
        },
        {
          "id": "Agent.MU",
          "display_name": "Agent.MU",
          "target": null
        },
        {
          "id": "Wacatac.B",
          "display_name": "Wacatac.B",
          "target": null
        },
        {
          "id": "Dropper.Gen",
          "display_name": "Dropper.Gen",
          "target": null
        },
        {
          "id": "WiseCleaner.A potentially unwanted",
          "display_name": "WiseCleaner.A potentially unwanted",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34170",
          "display_name": "Gen:NN.ZemsilF.34170",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILHeracles",
          "display_name": "Gen:Variant.MSILHeracles",
          "target": null
        },
        {
          "id": "Trojan.DownLoader33",
          "display_name": "Trojan.DownLoader33",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Program.Freemake",
          "display_name": "Program.Freemake",
          "target": null
        },
        {
          "id": "Kryptik.dawvk",
          "display_name": "Kryptik.dawvk",
          "target": null
        },
        {
          "id": "AdwareSig [Adw]",
          "display_name": "AdwareSig [Adw]",
          "target": null
        },
        {
          "id": "Phishing JPMorgan Chase and Co.",
          "display_name": "Phishing JPMorgan Chase and Co.",
          "target": null
        },
        {
          "id": "Adware.BrowseFoxCRTD",
          "display_name": "Adware.BrowseFoxCRTD",
          "target": null
        },
        {
          "id": "Suspici.1F4405D1",
          "display_name": "Suspici.1F4405D1",
          "target": null
        },
        {
          "id": "PUA.Wombat",
          "display_name": "PUA.Wombat",
          "target": null
        },
        {
          "id": "AdWare.DealPly",
          "display_name": "AdWare.DealPly",
          "target": null
        },
        {
          "id": "Injector.CUAM",
          "display_name": "Injector.CUAM",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "Troj_Gen.F04IE00CI19",
          "display_name": "Troj_Gen.F04IE00CI19",
          "target": null
        },
        {
          "id": "Worm.Autorun",
          "display_name": "Worm.Autorun",
          "target": null
        },
        {
          "id": "Worm.Boychi",
          "display_name": "Worm.Boychi",
          "target": null
        },
        {
          "id": "Worm.Allaple",
          "display_name": "Worm.Allaple",
          "target": null
        },
        {
          "id": "CVE-2014-3153",
          "display_name": "CVE-2014-3153",
          "target": null
        },
        {
          "id": "BehavesLike.ICLoader",
          "display_name": "BehavesLike.ICLoader",
          "target": null
        },
        {
          "id": "BScope.Backdoor",
          "display_name": "BScope.Backdoor",
          "target": null
        },
        {
          "id": "Trojan.WIN32.PDF.Alien",
          "display_name": "Trojan.WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "PUP.Systweak",
          "display_name": "PUP.Systweak",
          "target": null
        },
        {
          "id": "Sabsik.FL.B",
          "display_name": "Sabsik.FL.B",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Gen:Variant.Tedy HackTool.VulnDriver",
          "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
          "target": null
        },
        {
          "id": "Backdoor.Predator",
          "display_name": "Backdoor.Predator",
          "target": null
        },
        {
          "id": "Kryptik.GKQR",
          "display_name": "Kryptik.GKQR",
          "target": null
        },
        {
          "id": "DarkKomet.ife",
          "display_name": "DarkKomet.ife",
          "target": null
        },
        {
          "id": "BehavesLike.Downloader",
          "display_name": "BehavesLike.Downloader",
          "target": null
        },
        {
          "id": "Trojan.JS.Iframe",
          "display_name": "Trojan.JS.Iframe",
          "target": null
        },
        {
          "id": "InstallCore.NP",
          "display_name": "InstallCore.NP",
          "target": null
        },
        {
          "id": "Generic.JS.BlackHole",
          "display_name": "Generic.JS.BlackHole",
          "target": null
        },
        {
          "id": "Dropper.Wanna",
          "display_name": "Dropper.Wanna",
          "target": null
        },
        {
          "id": "Remote Utilities",
          "display_name": "Remote Utilities",
          "target": null
        },
        {
          "id": "W32.InstallCore.AGX",
          "display_name": "W32.InstallCore.AGX",
          "target": null
        },
        {
          "id": "NetTool.RemoteExec",
          "display_name": "NetTool.RemoteExec",
          "target": null
        },
        {
          "id": "Bondat.A",
          "display_name": "Bondat.A",
          "target": null
        },
        {
          "id": "VM201.0.B70B.Malware",
          "display_name": "VM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "Infected.WebPage",
          "display_name": "Infected.WebPage",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Script",
          "display_name": "HEUR:Exploit.Script",
          "target": null
        },
        {
          "id": "BScope.TrojanDownloader",
          "display_name": "BScope.TrojanDownloader",
          "target": null
        },
        {
          "id": "HTML:RedirBA",
          "display_name": "HTML:RedirBA",
          "target": null
        },
        {
          "id": "Trojan.BAT.Qhost",
          "display_name": "Trojan.BAT.Qhost",
          "target": null
        },
        {
          "id": "HTML:RedirME",
          "display_name": "HTML:RedirME",
          "target": null
        },
        {
          "id": "TrojWare.JS.AdWare.Agent",
          "display_name": "TrojWare.JS.AdWare.Agent",
          "target": null
        },
        {
          "id": "Packed.Dico",
          "display_name": "Packed.Dico",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1602.001",
          "name": "SNMP (MIB Dump)",
          "display_name": "T1602.001 - SNMP (MIB Dump)"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "653bf3b076e4dbcd0c099992",
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1695,
        "FileHash-SHA1": 756,
        "FileHash-SHA256": 2029,
        "domain": 290,
        "URL": 1854,
        "hostname": 568,
        "CVE": 5
      },
      "indicator_count": 7197,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "876 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "652b2a50c4487060d52346fd",
      "name": "Fitbit app link IoC's",
      "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
      "modified": "2023-11-13T22:04:06.580000",
      "created": "2023-10-14T23:54:55.973000",
      "tags": [
        "ssl certificate",
        "contacted",
        "contacted urls",
        "referrer",
        "march",
        "historical ssl",
        "whois sslcert",
        "suspicious",
        "execution",
        "malware",
        "core",
        "name verdict",
        "falco",
        "pattern match",
        "ascii text",
        "file",
        "png image",
        "sdcwhb",
        "windows nt",
        "jpeg image",
        "jfif",
        "appdata",
        "kg2exe",
        "date",
        "unknown",
        "general",
        "hybrid",
        "this",
        "click",
        "strings",
        "class",
        "critical",
        "error",
        "zfaoz",
        "falcon sandbox",
        "exit",
        "node tcp",
        "traffic",
        "et tor",
        "known tor",
        "relayrouter",
        "tor known",
        "tor relayrouter",
        "detection list",
        "ip address",
        "cisco umbrella",
        "heur",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "malicious url",
        "malicious site",
        "unsafe",
        "riskware",
        "swrort",
        "downldr",
        "artemis",
        "team",
        "phishing",
        "iframe",
        "crack",
        "xrat",
        "installcore",
        "facebook",
        "bank",
        "opencandy",
        "nircmd",
        "exploit",
        "filetour",
        "cleaner",
        "wacatac",
        "win64",
        "unruy",
        "blacknet rat",
        "stealer",
        "azorult",
        "service",
        "runescape",
        "download",
        "tiggre",
        "presenoker",
        "conduit",
        "xtrat",
        "agent",
        "patcher",
        "adload",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "iobit",
        "dropper",
        "trojanx",
        "webshell",
        "adposhel",
        "union",
        "trojanspy",
        "webtoolbar",
        "blacklist https",
        "blacklist",
        "command_and_control",
        "Fitbit",
        "hidden tear",
        "google",
        "spyware",
        "potentially unwanted progams",
        "network",
        "bundlers",
        "aware"
      ],
      "references": [
        "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
        "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ZfAoz",
          "display_name": "ZfAoz",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "MediaMagnet",
          "display_name": "MediaMagnet",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "WisdomEyes.16070401.9500",
          "display_name": "WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Wacatac",
          "display_name": "Wacatac",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre",
          "display_name": "Trojan:Win32/Tiggre",
          "target": "/malware/Trojan:Win32/Tiggre"
        },
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1052,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 3730,
        "URL": 2806,
        "domain": 446,
        "CVE": 17,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "888 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "652b2a8048e6a285461c4a5d",
      "name": "Fitbit app link IoC's",
      "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
      "modified": "2023-11-13T22:04:06.580000",
      "created": "2023-10-14T23:55:42.972000",
      "tags": [
        "ssl certificate",
        "contacted",
        "contacted urls",
        "referrer",
        "march",
        "historical ssl",
        "whois sslcert",
        "suspicious",
        "execution",
        "malware",
        "core",
        "name verdict",
        "falco",
        "pattern match",
        "ascii text",
        "file",
        "png image",
        "sdcwhb",
        "windows nt",
        "jpeg image",
        "jfif",
        "appdata",
        "kg2exe",
        "date",
        "unknown",
        "general",
        "hybrid",
        "this",
        "click",
        "strings",
        "class",
        "critical",
        "error",
        "zfaoz",
        "falcon sandbox",
        "exit",
        "node tcp",
        "traffic",
        "et tor",
        "known tor",
        "relayrouter",
        "tor known",
        "tor relayrouter",
        "detection list",
        "ip address",
        "cisco umbrella",
        "heur",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "malicious url",
        "malicious site",
        "unsafe",
        "riskware",
        "swrort",
        "downldr",
        "artemis",
        "team",
        "phishing",
        "iframe",
        "crack",
        "xrat",
        "installcore",
        "facebook",
        "bank",
        "opencandy",
        "nircmd",
        "exploit",
        "filetour",
        "cleaner",
        "wacatac",
        "win64",
        "unruy",
        "blacknet rat",
        "stealer",
        "azorult",
        "service",
        "runescape",
        "download",
        "tiggre",
        "presenoker",
        "conduit",
        "xtrat",
        "agent",
        "patcher",
        "adload",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "iobit",
        "dropper",
        "trojanx",
        "webshell",
        "adposhel",
        "union",
        "trojanspy",
        "webtoolbar",
        "blacklist https",
        "blacklist",
        "command_and_control",
        "Fitbit",
        "hidden tear",
        "google",
        "spyware",
        "potentially unwanted progams",
        "network",
        "bundlers",
        "aware"
      ],
      "references": [
        "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
        "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ZfAoz",
          "display_name": "ZfAoz",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "MediaMagnet",
          "display_name": "MediaMagnet",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "WisdomEyes.16070401.9500",
          "display_name": "WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Wacatac",
          "display_name": "Wacatac",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre",
          "display_name": "Trojan:Win32/Tiggre",
          "target": "/malware/Trojan:Win32/Tiggre"
        },
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1052,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 3730,
        "URL": 2806,
        "domain": 446,
        "CVE": 17,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "888 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://sync.taneda.xyz",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://sync.taneda.xyz",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776703324.5096343
}