{
  "type": "URL",
  "indicator": "https://test.sanfoundry.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://test.sanfoundry.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3786750451,
      "indicator": "https://test.sanfoundry.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 21,
      "pulses": [
        {
          "id": "68f7582b2454d926e77db68c",
          "name": "AWS does have issues - Indictor removal service impacting threat hunting services",
          "description": "Malicious. I hope the pulse posted yesterday didn\u2019t lead to AWS outage. I learned about it a few a few hours ago. AWS does have issues, like having a monopoly and the type of services allowed to exist on their servers. I never  saw the links until I learned. I appreciate tips , opinions , and sharing.received. An issue found on targets old iOS 14 device ,due to deletions . This  had me researching a link that  is related to multiple links researched before. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship). There are many other malicious indicators.",
          "modified": "2025-11-20T06:00:01.014000",
          "created": "2025-10-21T09:53:47.767000",
          "tags": [
            "url http",
            "url https",
            "united",
            "sweden",
            "canada",
            "search",
            "type indicator",
            "added active",
            "related pulses",
            "aws",
            "passive dns",
            "urls",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "safe browsing",
            "present jun",
            "present sep",
            "present aug",
            "present jul",
            "present oct",
            "present may",
            "ip address",
            "uruguay unknown",
            "india showing",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "unknown",
            "write",
            "read",
            "unknown www",
            "et trojan",
            "suspicious",
            "read c",
            "myagrent",
            "get myagrent",
            "win32",
            "malware",
            "ids detections",
            "et",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "pcratgh0st cnc",
            "backdoor family",
            "show",
            "ms windows",
            "trojandropper",
            "code",
            "next",
            "polymorphic",
            "indicator role",
            "title added",
            "active related",
            "report spam",
            "threat hunters",
            "brian",
            "sabey created",
            "day ago",
            "white indicator",
            "sabey",
            "worm",
            "emotet",
            "tags",
            "malware family",
            "ck ids",
            "t1140",
            "information",
            "t1045",
            "packing",
            "t1060",
            "dns",
            "role title",
            "filehashmd5",
            "malware attacks",
            "find encrypted",
            "pulses url",
            "q oct",
            "dns",
            "ators show",
            "tbmvid",
            "sourcelnms",
            "ipv4",
            "types",
            "indicators show"
          ],
          "references": [
            "business-support.intel.com \u2022 dns0.org \u2022 http://g-ns-1047.awsdns-20.org/",
            "Alerts: physical_drive_access deletes_executed_files anomalous_deletefile",
            "Alerts: suspicious_iocontrol_codes polymorphic static_pe_anomaly suricata_alert",
            "Alerts: injection_rwx antivm_checks_available_memory queries_computer_name",
            "Alerts: resumethread_remote_process  antivm_generic_disk antisandbox_sleep dynamic_function_loading",
            "Alerts: enumerates_running_processes reads_self packer_unknown_pe_section_name contains_pe_overlay dropper queries_keyboard_layout",
            "102 Yara Detections: XOR_embeded_exefile_xored_with_round_256_bytes_key",
            "More PE Packer Microsoft Visual C++  Compilation | File Type PEXE - PE32 executable (GUI) Intel 80386, for MS Windows",
            "IDS Detections: Backdoor family PCRat/Gh0st CnC traffic Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND)",
            "Contacted ipp.getcash2018.com conf.f.360.cn",
            "All IP\u2019s Contacted  27.102.115.143  199.232.210.172 Domains",
            "IDS Detections: Backdoor family PCRat/Gh0st CnC traffic Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND)",
            "New? patch-aws-8y03-v202542-266-2.space.prod.a0core.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Zegost",
              "display_name": "Zegost",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Zegost.B",
              "display_name": "TrojanDropper:Win32/Zegost.B",
              "target": "/malware/TrojanDropper:Win32/Zegost.B"
            },
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            },
            {
              "id": "Trojan:Win32/Fugrafa",
              "display_name": "Trojan:Win32/Fugrafa",
              "target": "/malware/Trojan:Win32/Fugrafa"
            },
            {
              "id": "Win32:MalwareX-gen",
              "display_name": "Win32:MalwareX-gen",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1224,
            "URL": 2979,
            "domain": 609,
            "FileHash-SHA256": 765,
            "FileHash-SHA1": 350,
            "FileHash-MD5": 374,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 6303,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "150 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d32648280eb859dfca1c19",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:48.037000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "566 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d3264283628d23b8f28b9d",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:42.621000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "566 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85e73efe2e053366ed972",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-09-05T06:21:34.047000",
          "created": "2024-01-30T02:26:59.218000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6145,
            "URL": 14252,
            "hostname": 4778,
            "domain": 6809,
            "CVE": 3
          },
          "indicator_count": 32339,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "591 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aaba128167bfe90a0ab7e8",
          "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
          "description": "",
          "modified": "2024-02-17T02:03:48.897000",
          "created": "2024-01-19T18:06:10.095000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "contacted",
            "referrer",
            "whois record",
            "communicating",
            "highly targeted",
            "apple ios",
            "tsara brashears",
            "core",
            "hacktool",
            "emotet",
            "copy",
            "installer",
            "formbook",
            "ransomware",
            "critical",
            "benjamin",
            "phishing",
            "trojan",
            "worm",
            "date",
            "passive dns",
            "urls",
            "search",
            "status",
            "nxdomain",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "getprocaddress",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "united",
            "as40528 icann",
            "unknown",
            "as26710 icann",
            "pulse pulses",
            "showing",
            "as16876 icann",
            "aaaa",
            "certificate",
            "domain",
            "gandi sas",
            "files",
            "adware",
            "cybercrime",
            "malvertizing",
            "password stealer",
            "ios unlocker",
            "beautiful",
            "model",
            "songwriter",
            "pornhub",
            "fireeye",
            "espionage",
            "targeting"
          ],
          "references": [
            "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
            "nr-data.net [Apple Private Data Collection]",
            "https://stackabuse.com/assets/images/apple",
            "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
            "CVE-2023-4966",
            "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
            "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
            "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
          ],
          "public": 1,
          "adversary": "LockBit 3.0 Ransomware Affiliates",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Government",
            "Civil society",
            "Private Sector",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "65a89d024f9153ccae3a8500",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 2869,
            "URL": 2492,
            "CVE": 2,
            "domain": 1079,
            "hostname": 817,
            "SSLCertFingerprint": 2,
            "email": 3
          },
          "indicator_count": 7358,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aaba12436a318c6567cba8",
          "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
          "description": "",
          "modified": "2024-02-17T02:03:48.897000",
          "created": "2024-01-19T18:06:10.934000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "contacted",
            "referrer",
            "whois record",
            "communicating",
            "highly targeted",
            "apple ios",
            "tsara brashears",
            "core",
            "hacktool",
            "emotet",
            "copy",
            "installer",
            "formbook",
            "ransomware",
            "critical",
            "benjamin",
            "phishing",
            "trojan",
            "worm",
            "date",
            "passive dns",
            "urls",
            "search",
            "status",
            "nxdomain",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "getprocaddress",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "united",
            "as40528 icann",
            "unknown",
            "as26710 icann",
            "pulse pulses",
            "showing",
            "as16876 icann",
            "aaaa",
            "certificate",
            "domain",
            "gandi sas",
            "files",
            "adware",
            "cybercrime",
            "malvertizing",
            "password stealer",
            "ios unlocker",
            "beautiful",
            "model",
            "songwriter",
            "pornhub",
            "fireeye",
            "espionage",
            "targeting"
          ],
          "references": [
            "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
            "nr-data.net [Apple Private Data Collection]",
            "https://stackabuse.com/assets/images/apple",
            "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
            "CVE-2023-4966",
            "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
            "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
            "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
          ],
          "public": 1,
          "adversary": "LockBit 3.0 Ransomware Affiliates",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Government",
            "Civil society",
            "Private Sector",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "65a89d024f9153ccae3a8500",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 2869,
            "URL": 2492,
            "CVE": 2,
            "domain": 1079,
            "hostname": 817,
            "SSLCertFingerprint": 2,
            "email": 3
          },
          "indicator_count": 7358,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aaba0fe5834eef98066f6e",
          "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
          "description": "",
          "modified": "2024-02-17T02:03:48.897000",
          "created": "2024-01-19T18:06:07.730000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "contacted",
            "referrer",
            "whois record",
            "communicating",
            "highly targeted",
            "apple ios",
            "tsara brashears",
            "core",
            "hacktool",
            "emotet",
            "copy",
            "installer",
            "formbook",
            "ransomware",
            "critical",
            "benjamin",
            "phishing",
            "trojan",
            "worm",
            "date",
            "passive dns",
            "urls",
            "search",
            "status",
            "nxdomain",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "getprocaddress",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "united",
            "as40528 icann",
            "unknown",
            "as26710 icann",
            "pulse pulses",
            "showing",
            "as16876 icann",
            "aaaa",
            "certificate",
            "domain",
            "gandi sas",
            "files",
            "adware",
            "cybercrime",
            "malvertizing",
            "password stealer",
            "ios unlocker",
            "beautiful",
            "model",
            "songwriter",
            "pornhub",
            "fireeye",
            "espionage",
            "targeting"
          ],
          "references": [
            "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
            "nr-data.net [Apple Private Data Collection]",
            "https://stackabuse.com/assets/images/apple",
            "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
            "CVE-2023-4966",
            "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
            "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
            "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
          ],
          "public": 1,
          "adversary": "LockBit 3.0 Ransomware Affiliates",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Government",
            "Civil society",
            "Private Sector",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "65a89d024f9153ccae3a8500",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 2869,
            "URL": 2492,
            "CVE": 2,
            "domain": 1079,
            "hostname": 817,
            "SSLCertFingerprint": 2,
            "email": 3
          },
          "indicator_count": 7358,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a89d024f9153ccae3a8500",
          "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
          "description": "LockBit seeks initial access to target networks primarily through purchased access, unpatched vulnerabilities, insider access, and zero-day exploits. \n\nCVE 2023-4966 (Citrix Bleed) to bypass password requirements and multifactor authentication (MFA), leading to successful session hijacking of legitimate user sessions on Citrix NetScaler web application delivery control (ADC) and Gateway appliances.",
          "modified": "2024-02-17T02:03:48.897000",
          "created": "2024-01-18T03:37:38.334000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "contacted",
            "referrer",
            "whois record",
            "communicating",
            "highly targeted",
            "apple ios",
            "tsara brashears",
            "core",
            "hacktool",
            "emotet",
            "copy",
            "installer",
            "formbook",
            "ransomware",
            "critical",
            "benjamin",
            "phishing",
            "trojan",
            "worm",
            "date",
            "passive dns",
            "urls",
            "search",
            "status",
            "nxdomain",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "getprocaddress",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "united",
            "as40528 icann",
            "unknown",
            "as26710 icann",
            "pulse pulses",
            "showing",
            "as16876 icann",
            "aaaa",
            "certificate",
            "domain",
            "gandi sas",
            "files",
            "adware",
            "cybercrime",
            "malvertizing",
            "password stealer",
            "ios unlocker",
            "beautiful",
            "model",
            "songwriter",
            "pornhub",
            "fireeye",
            "espionage",
            "targeting"
          ],
          "references": [
            "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
            "nr-data.net [Apple Private Data Collection]",
            "https://stackabuse.com/assets/images/apple",
            "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
            "CVE-2023-4966",
            "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
            "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
            "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
          ],
          "public": 1,
          "adversary": "LockBit 3.0 Ransomware Affiliates",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Government",
            "Civil society",
            "Private Sector",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 2869,
            "URL": 2492,
            "CVE": 2,
            "domain": 1079,
            "hostname": 817,
            "SSLCertFingerprint": 2,
            "email": 3
          },
          "indicator_count": 7358,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a0012061cc62dae1423a4d",
          "name": "Masquerading | UCHealth| 'University of Cincinnati' | MITRE ATT&CK",
          "description": "",
          "modified": "2024-02-10T08:00:08.779000",
          "created": "2024-01-11T14:54:24.703000",
          "tags": [
            "json data",
            "localappdata",
            "temp",
            "windir",
            "getprocaddress",
            "ascii text",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "path",
            "win64",
            "date",
            "factory",
            "hybrid",
            "contacted",
            "germany unknown",
            "as47846",
            "as31103 keyweb",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "urls",
            "files",
            "benjamin",
            "network",
            "cams",
            "feeds",
            "malicious adware",
            "urlref",
            "worm"
          ],
          "references": [
            "https://my.uchealth.com/myuchealth/Authentication/Login/DoJump?token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJ1cm46VUNIZWFsdGg6Y2Utc",
            "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
            "voyour-cams.xww.de [W32.DSS.Trojan]",
            "https://www.hybrid-analysis.com/sample/5cde83981d63661bad25f5900043e2dacaae3aac005b1201d7ea8182c0ec427c/659e999528b388097206d52c",
            "http://voyour-cams.xww.de/ [image referer, dga, malware, parked, ads]",
            "UCHealth 'University of Cincinnati'  vulnerable/compromised/related 'UCHealth.com' domains and URL's",
            "allaboutcircuits.com l DGA domain | treehugger.com [ueleconomy.gov] | uchealth.com | http://cancer.uchealth.com | https://cancer.uchealth.com",
            "https://cancer.uchealth.com/ | http://michaela.young@uchealth.com/ | https://www.uchealth.com/physician/frank-avilucea/ |",
            "https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30 | https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf",
            "Malicious File Hash- SHA256  98a2a9c25e6240e44c595a693ed7b48c9c412969855b219e46dd9379006673d3",
            "High severity - suspicious_write_exe, network_icmp, modifies_certificates, process_martian, injection_resumethread",
            "Medium severity - dumped_buffer js_eval network_http allocates_rwx antisandbox_foregroundwindows creates_exe creates_shortcut suspicious_process stealth_window uses_windows_utilities recon_fingerprint antivm_memory_available Less High Priority IP\u2019s Contacted 16 IP\u2019s Contacted  104.16.18.94  104.20.234.39  104.26.11.189  104.26.3.202  13.107.4.50 More Domains Contacted 17 Domains Contacted www.bing.com www.allaboutcircuits.com allaboutcircuits.com ocsp.digicert.com securepubads.g.doubleclick.net More Related",
            "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
            "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf | https://www.uchealth.com/locations/uc-health-physicians-office-midtown/",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=labdetail&e%E2%80%A64bK43QgfcL6kD9bT8hI9YIXWVk5xuOPWrqJQNWVGZwZo-3D&printmode=true",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24wYBOtOuf1BKR-2B8XDFJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24wYBOtOuf1BKR-2B8XDFJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "64.190.63.111 | More AV Detection | !#HSTR:SigGen0136cb6c, ALF:CERT:Adware:Win32/Peapoon , ALF:HeraklezEval:Exploit:O97M/CVE-2017-11882.DR!rfn ,  ALF:HeraklezEval:PUA:Win32/4Shared ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:TrojanDownloader:HTML/Adodb!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Dofoil!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Ymacco!rfn ,  ALF:HeraklezEval:VirTool:WinNT/Rootkitdrv.HK ,  ALF:JASYP:Backdoor:Win32/FlyAgent!atmn ...",
            "High severity - LokiBot User-Agent (Charon/Inferno) Win32.Worm.Benjamin.A CnC Checkin Worm.Mydoom Checkin User-Agent (explwer)",
            "Win32/Fosniw MacTryCnt CnC Style Checkin Win32/SniperSpy Checkin LDPinch Checkin Post Win32.Sality-GR Checkin ADWARE/InstallCore.Gen Checkin LokiBot Checkin .",
            "cdn.porngifs.com, porngifs.com, http://girlscam.xww.de, httpvoyour-cams.xww.de [urlref]",
            "Worm:Win32/Benjamin",
            "https://otx.alienvault.com/malware/Worm:Win32%2FBenjamin/samples"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "FileHash-SHA1": 3,
            "URL": 829,
            "domain": 681,
            "hostname": 264,
            "FileHash-SHA256": 1927
          },
          "indicator_count": 3708,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "799 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659f8c2ff1f9c7a3e3605199",
          "name": "ET MALWARE LokiBot User (Charon/Inferno) Worm:Win32/Benjamin",
          "description": "https://otx.alienvault.com/malware/Worm:Win32%2FBenjamin/\n \nhttps://www.hybrid-analysis.com/sample/3e6f749f6f10dbe471cd14b6441135cdea582f429c523b20d149b335d5b192d2",
          "modified": "2024-02-10T06:03:44.899000",
          "created": "2024-01-11T06:35:27.311000",
          "tags": [
            "name verdict",
            "falcon sandbox",
            "getprocaddress",
            "windir",
            "path",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "pattern match",
            "win64",
            "date",
            "open",
            "factory",
            "hybrid",
            "general",
            "config"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 1371,
            "hostname": 165,
            "SSLCertFingerprint": 2,
            "URL": 653,
            "domain": 693,
            "email": 1
          },
          "indicator_count": 2895,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "799 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8e4a55f5851279c265c8",
          "name": "https://www.hallrender.com/attorney/brian-sabey/ Gopher Ransomware ",
          "description": "",
          "modified": "2024-02-03T19:04:42.251000",
          "created": "2024-02-03T19:04:42.251000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85e73efe2e053366ed972",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659560d63178b32f07838efb",
          "name": "Covert | Big O Tires active cyber threat | Dark Power | Emotet|",
          "description": "Active, ongoing cyber threat, multiple malicious activities including, network rat, ransomware encryption, social engineering,  spammers, infostealer, botnet activity.\nConsumers may also be contacted by mail or phone or find account seized. I haven't benn able to properly access the magnitude of the issue, there has been at least a handful of customers in good standing , with higher limits on paid of cards that ended up being stolen or according to Big O Representatives 'closed' for unfounded reasons; failure to confirm citizenship, identity, unknown patriot act offences, failure to comply Big O Tires via mail.",
          "modified": "2024-02-02T12:04:41.638000",
          "created": "2024-01-03T13:27:50.685000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "unsafeeval",
            "path",
            "expiressat",
            "auto",
            "wheels online",
            "o tires",
            "shop tires",
            "html info",
            "title shop",
            "tires",
            "meta tags",
            "big o",
            "tires language",
            "name verdict",
            "falcon sandbox",
            "samples",
            "localappdata",
            "json data",
            "temp",
            "getprocaddress",
            "ascii text",
            "windir",
            "file",
            "indicator",
            "mitre att",
            "ck id",
            "factory",
            "hybrid",
            "model",
            "comspec",
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "historical ssl",
            "whois whois",
            "simda http",
            "collections",
            "historical",
            "dropped",
            "backdoor",
            "unknown",
            "united",
            "asnone",
            "show",
            "entries",
            "search",
            "intel",
            "ms windows",
            "pe32",
            "windows nt",
            "copy",
            "write",
            "logic",
            "download",
            "malware",
            "suspicious",
            "next",
            "destination",
            "port",
            "components",
            "globalnpf",
            "china as23724",
            "music",
            "data c",
            "mexico",
            "as15169 google",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "win32",
            "united kingdom",
            "explorer",
            "xserver",
            "mtb aug",
            "location united",
            "america asn",
            "open",
            "trojan",
            "worm",
            "dataadobereader",
            "as397240",
            "msie",
            "etpro trojan",
            "virgin islands",
            "script urls",
            "creation date",
            "record value",
            "date",
            "a domains",
            "all search",
            "otx octoseek",
            "url http",
            "http",
            "related nids",
            "pulse http",
            "url https",
            "files location",
            "as20940",
            "aaaa",
            "as2914 ntt",
            "canada unknown",
            "japan unknown",
            "as16625 akamai",
            "domain",
            "hostname",
            "gmt content",
            "gmt report",
            "0 report",
            "sea alt",
            "body",
            "encrypt",
            "social engineering",
            "revenge rat",
            "rat",
            "identity theft",
            "credit card",
            "referrer",
            "communicating",
            "bundled",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "ransomware",
            "cobalt strike",
            "attack",
            "core",
            "emotet",
            "exploit",
            "hacktool",
            "mail spammer",
            "as63949 linode",
            "mtb dec",
            "checkin m1",
            "trojanspy",
            "artro",
            "remote",
            "infostealer"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Ukraine",
            "Georgia",
            "India",
            "Hong Kong",
            "Canada",
            "China",
            "Indonesia",
            "South Africa",
            "Germany",
            "Slovenia",
            "Mexico",
            "Netherlands",
            "Japan",
            "Spain",
            "Argentina",
            "France",
            "Chile",
            "Italy",
            "Aruba",
            "Switzerland",
            "United Kingdom of Great Britain and Northern Ireland",
            "Denmark",
            "Poland",
            "Colombia",
            "Taiwan",
            "Bulgaria",
            "Austria",
            "Russian Federation",
            "Australia",
            "Philippines",
            "Norway",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "display_name": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "Trojan:MSIL/ClipBanker.GB!MTB",
              "display_name": "Trojan:MSIL/ClipBanker.GB!MTB",
              "target": "/malware/Trojan:MSIL/ClipBanker.GB!MTB"
            },
            {
              "id": "Virus:Win32/Floxif.H",
              "display_name": "Virus:Win32/Floxif.H",
              "target": "/malware/Virus:Win32/Floxif.H"
            },
            {
              "id": "Win.Packed.Zusy-7170176-0",
              "display_name": "Win.Packed.Zusy-7170176-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-9880005-0",
              "display_name": "Win.Trojan.Zbot-9880005-0",
              "target": null
            },
            {
              "id": "'Win32:Trojan-gen",
              "display_name": "'Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "display_name": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.B",
              "display_name": "Worm:Win32/Mofksys.B",
              "target": "/malware/Worm:Win32/Mofksys.B"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Worm:LOGO/Logic",
              "display_name": "Worm:LOGO/Logic",
              "target": "/malware/Worm:LOGO/Logic"
            },
            {
              "id": "ETPro Trojan",
              "display_name": "ETPro Trojan",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Swisyn",
              "display_name": "TrojanSpy:Win32/Swisyn",
              "target": "/malware/TrojanSpy:Win32/Swisyn"
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 560,
            "FileHash-SHA1": 350,
            "FileHash-SHA256": 4371,
            "URL": 8165,
            "domain": 2548,
            "hostname": 2813,
            "CVE": 4,
            "email": 3
          },
          "indicator_count": 18814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "807 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944a8149f2479b2fbc6cd1",
          "name": "Relic",
          "description": "Malicious redirect to BotNet malvertizing of a business affecting both .command YouTube distribution. YouTube encoded logins. Hacker attack, geo tracking, passwords crack, decryption, C2. Retaliation. Found in referenced Twitter link shared  with me.",
          "modified": "2024-02-01T14:01:46.735000",
          "created": "2024-01-02T17:40:17.890000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers nel",
            "maxage5184000",
            "name verdict",
            "falcon sandbox",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "whois whois",
            "historical ssl",
            "contacted",
            "highly targeted",
            "hackers",
            "botnet",
            "apple ios",
            "malicious",
            "hacktool",
            "quasar",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "file",
            "pattern match",
            "path",
            "date",
            "win64",
            "factory",
            "model",
            "comspec",
            "hybrid",
            "general",
            "click",
            "strings",
            "patch",
            "song culture",
            "tulach"
          ],
          "references": [
            "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
            "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
            "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
            "nr-data.net [Apple Private Data Collection]",
            "init.ess.apple.com [backdoor, malicious script, access via media]",
            "https://stackabuse.com/assets/images/apple",
            "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
            "location-icloud.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
            "mailtrack.io [tracking VirusTotal graphs, link trace back]",
            "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
            "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
            "https://pin.it/ [faux Pinterest for TB]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
            "114.114.114.114 [ Tulach Malware IP]",
            "13.107.136.8  [ Tulach Malware IP redirect]",
            "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
            "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
            "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
            "http://114.114.114.114/ipw.ps1",
            "194.245.148.189 [CnC]",
            "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
            "http://109.206.241.129/666bins/666.mpsl",
            "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
            "143.244.50.213 |169.150.249.162  [malware_hosting]",
            "http://watchhers.net/index.php [malware spreader]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "xred.mooo.com [pornhub trojan]",
            "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
            "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
            "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8049,
            "FileHash-MD5": 388,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 7062,
            "domain": 4401,
            "hostname": 2653,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 22769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85e7056e146f1416eae32",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-01-30T02:26:56.698000",
          "created": "2024-01-30T02:26:56.698000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "810 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944b9812ea52ab41c0259d",
          "name": "Mirai Apple Attack +",
          "description": "",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2024-01-02T17:44:56.709000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "658f967a4fc7ebe8021b9382",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659127f3265ec6306b607faa",
          "name": "Mirai Apple Attack +",
          "description": "",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2023-12-31T08:36:03.380000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "658f967a4fc7ebe8021b9382",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658f967a4fc7ebe8021b9382",
          "name": "Mirai Apple Attack +",
          "description": "This is hard to make sense of. All calls, clicks on a DGA Domain masquerading as desired service, lands you on the radar of a faux service where in turn bad actors attack everything. Target, remotely hack, follow, smear your life, same victim auto populates 79%, no hunt for assaulter.\n I'm assuming to see it one must 1st be in a Botnet. We keep seeing the same targets but no preparator. \nShe said \"Life was busy, life was good; full of health and hope. Then one sunny October day... I'm still grateful but what happened my body, thoughts and the world around me? Where's God? Am I a criminally responsible for getting attacked?\"",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2023-12-30T04:03:06.598000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ca37e41ea135fa35b8832",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/ ",
          "description": "",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T22:21:50.409000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74f4a6c53cc8e0f70611",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:51:00.982000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74ee93a0b0dc9c960cee",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:50:54.481000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6564fa9a3d90d1cd14928b16",
          "name": "Lumma \u2022 University of Alberta \"No Problems\" | T1036 - Masquerading",
          "description": "I was contacted on this forum re: University of Alberta issue. Based on research  www.ualberta.ca redirects. There hasn't been a research effort for redirect. I researched a spoofed website. After viewing senders request, my devices operating system changed, isn't recognized by any accounts, keyloggers.\nFound: Anonymizers, Redirector, Masquerading, Network RAT, Serious Social Engineering, Botnetwork Army, Stealers, Lumma and weirdly targeted  'Tsara Brashears' as a malicious link on a spoofed University in Canada, UCHealth Colorado links.",
          "modified": "2023-12-27T19:03:02.665000",
          "created": "2023-11-27T20:22:50.050000",
          "tags": [
            "threat report",
            "back",
            "ip summary",
            "url summary",
            "summary",
            "download csv",
            "download",
            "json url",
            "urls",
            "detection list",
            "cisco umbrella",
            "site",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "malware",
            "malicious site",
            "phishing site",
            "malicious url",
            "phishing",
            "riskware",
            "presenoker",
            "artemis",
            "agent",
            "unsafe",
            "opencandy",
            "ursnif",
            "wacatac",
            "team",
            "facebook",
            "runescape",
            "service",
            "downldr",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "installcore",
            "fareit",
            "secrisk",
            "exploit",
            "mimikatz",
            "sorano",
            "emotet",
            "genkryptik",
            "fuery",
            "dbatloader",
            "qakbot",
            "alexa",
            "malicious",
            "union",
            "lumma stealer",
            "fusioncore",
            "cleaner",
            "azorult",
            "bank",
            "blacknet rat",
            "stealer",
            "iframe",
            "trojanspy",
            "analysis",
            "united",
            "firehol",
            "proxy",
            "mail spammer",
            "downloader",
            "malware site",
            "meterpreter",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "unruy",
            "adwind",
            "trojanx",
            "crack",
            "win64",
            "generic",
            "dnspionage",
            "expirestue",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "alberta",
            "university",
            "edmonton",
            "html info",
            "alberta meta",
            "tags",
            "trackers google",
            "tag manager",
            "gtmkr32",
            "blacklist",
            "low risk",
            "apache",
            "domain",
            "malware found",
            "unknown",
            "minimal low",
            "security risk",
            "medium high",
            "critical",
            "protect",
            "college",
            "mtis",
            "faculties",
            "research",
            "health",
            "a about",
            "news",
            "events",
            "sport",
            "life",
            "find",
            "story",
            "tools",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "pattern match",
            "file",
            "date",
            "factory",
            "hybrid",
            "general",
            "cookie",
            "click",
            "strings",
            "djin",
            "no data",
            "tag count",
            "sample",
            "samples",
            "netsky",
            "cobalt strike",
            "xrat",
            "fakealert",
            "raccoon",
            "redline stealer",
            "metastealer",
            "icedid",
            "quasar rat",
            "acint",
            "anonymizer",
            "blockchain",
            "social engineering",
            "read c",
            "search",
            "show",
            "medium",
            "entries",
            "whitelisted",
            "memcommit",
            "delete",
            "yara detections",
            "next",
            "dock",
            "write",
            "execution",
            "copy",
            "south carolina",
            "federal credit",
            "team proxy",
            "static engine",
            "covid19",
            "redirector",
            "suspic",
            "tue mar",
            "zbot",
            "size68b type",
            "count blacklist",
            "tag tag",
            "rejected sample",
            "icon",
            "analyzed",
            "hwp support",
            "falcon sandbox",
            "multi scan",
            "update",
            "view details",
            "upgrade",
            "blacklist https",
            "keyloggers"
          ],
          "references": [
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  (iPhone unlocker)",
            "uchealth.com",
            "http://michaela.young@uchealth.com",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
            "https://www.uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "Network RAT",
              "display_name": "Network RAT",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "Meterpreter",
              "display_name": "Meterpreter",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Brontok",
              "display_name": "Brontok",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1126",
              "name": "Network Share Connection Removal",
              "display_name": "T1126 - Network Share Connection Removal"
            },
            {
              "id": "T1136",
              "name": "Create Account",
              "display_name": "T1136 - Create Account"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1134.004",
              "name": "Parent PID Spoofing",
              "display_name": "T1134.004 - Parent PID Spoofing"
            }
          ],
          "industries": [
            "Education",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 320,
            "FileHash-SHA1": 172,
            "FileHash-SHA256": 4302,
            "URL": 8243,
            "CIDR": 1,
            "domain": 1742,
            "hostname": 2270,
            "CVE": 18,
            "SSLCertFingerprint": 3,
            "email": 4
          },
          "indicator_count": 17075,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "102 Yara Detections: XOR_embeded_exefile_xored_with_round_256_bytes_key",
        "https://cancer.uchealth.com/ | http://michaela.young@uchealth.com/ | https://www.uchealth.com/physician/frank-avilucea/ |",
        "00000000000.cloudfront.net",
        "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
        "nr-data.net | Apple Private Data collection",
        "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
        "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
        "Alerts: enumerates_running_processes reads_self packer_unknown_pe_section_name contains_pe_overlay dropper queries_keyboard_layout",
        "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
        "https://otx.alienvault.com/malware/Worm:Win32%2FBenjamin/samples",
        "voyour-cams.xww.de [W32.DSS.Trojan]",
        "http://109.206.241.129/666bins/666.mpsl",
        "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
        "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
        "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
        "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
        "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "Alerts: suspicious_iocontrol_codes polymorphic static_pe_anomaly suricata_alert",
        "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
        "https://my.uchealth.com/myuchealth/Authentication/Login/DoJump?token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJ1cm46VUNIZWFsdGg6Y2Utc",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "http://watchhers.net/index.php [malware spreader]",
        "Alerts: physical_drive_access deletes_executed_files anomalous_deletefile",
        "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
        "New? patch-aws-8y03-v202542-266-2.space.prod.a0core.net",
        "https://www.hallrender.com/attorney/brian-sabey/",
        "business-support.intel.com \u2022 dns0.org \u2022 http://g-ns-1047.awsdns-20.org/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24wYBOtOuf1BKR-2B8XDFJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "All IP\u2019s Contacted  27.102.115.143  199.232.210.172 Domains",
        "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
        "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
        "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
        "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json",
        "uchealth.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
        "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf",
        "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
        "Contacted ipp.getcash2018.com conf.f.360.cn",
        "Malicious File Hash- SHA256  98a2a9c25e6240e44c595a693ed7b48c9c412969855b219e46dd9379006673d3",
        "https://www.hybrid-analysis.com/sample/5cde83981d63661bad25f5900043e2dacaae3aac005b1201d7ea8182c0ec427c/659e999528b388097206d52c",
        "https://www.uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf",
        "114.114.114.114 [ Tulach Malware IP]",
        "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
        "More PE Packer Microsoft Visual C++  Compilation | File Type PEXE - PE32 executable (GUI) Intel 80386, for MS Windows",
        "High severity - LokiBot User-Agent (Charon/Inferno) Win32.Worm.Benjamin.A CnC Checkin Worm.Mydoom Checkin User-Agent (explwer)",
        "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
        "Worm:Win32/Benjamin",
        "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
        "mailtrack.io [tracking VirusTotal graphs, link trace back]",
        "194.245.148.189 [CnC]",
        "https://www.journaldev.com/41403/regex",
        "http://114.114.114.114/ipw.ps1",
        "business-support.intel.com",
        "High severity - suspicious_write_exe, network_icmp, modifies_certificates, process_martian, injection_resumethread",
        "00000000.apple.com  | remote SIM Swap",
        "13.107.136.8  [ Tulach Malware IP redirect]",
        "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf | https://www.uchealth.com/locations/uc-health-physicians-office-midtown/",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "location-icloud.com",
        "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
        "xred.mooo.com [pornhub trojan]",
        "nr-data.net [Apple Private Data Collection]",
        "cdn.porngifs.com, porngifs.com, http://girlscam.xww.de, httpvoyour-cams.xww.de [urlref]",
        "artificial-legal-intelligence.com",
        "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
        "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
        "Win32/Fosniw MacTryCnt CnC Style Checkin Win32/SniperSpy Checkin LDPinch Checkin Post Win32.Sality-GR Checkin ADWARE/InstallCore.Gen Checkin LokiBot Checkin .",
        "usw2-platform-dmchat-avengers-prod-ext.apple.com",
        "https://twitter.com/PORNO_SEXYBABES",
        "Medium severity - dumped_buffer js_eval network_http allocates_rwx antisandbox_foregroundwindows creates_exe creates_shortcut suspicious_process stealth_window uses_windows_utilities recon_fingerprint antivm_memory_available Less High Priority IP\u2019s Contacted 16 IP\u2019s Contacted  104.16.18.94  104.20.234.39  104.26.11.189  104.26.3.202  13.107.4.50 More Domains Contacted 17 Domains Contacted www.bing.com www.allaboutcircuits.com allaboutcircuits.com ocsp.digicert.com securepubads.g.doubleclick.net More Related",
        "Alerts: injection_rwx antivm_checks_available_memory queries_computer_name",
        "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
        "allaboutcircuits.com l DGA domain | treehugger.com [ueleconomy.gov] | uchealth.com | http://cancer.uchealth.com | https://cancer.uchealth.com",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=labdetail&e%E2%80%A64bK43QgfcL6kD9bT8hI9YIXWVk5xuOPWrqJQNWVGZwZo-3D&printmode=true",
        "103.246.145.111 phishing",
        "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
        "CVE-2023-4966",
        "IDS Detections: Backdoor family PCRat/Gh0st CnC traffic Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND)",
        "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
        "http://medlineplus.gov.https.sci-hub.st",
        "103.246.145.111  - scanning host",
        "143.244.50.213 |169.150.249.162  [malware_hosting]",
        "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
        "https://pin.it/ [faux Pinterest for TB]",
        "http://michaela.young@uchealth.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
        "UCHealth 'University of Cincinnati'  vulnerable/compromised/related 'UCHealth.com' domains and URL's",
        "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]",
        "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc",
        "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
        "mobileaccess.intel.com",
        "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "http://voyour-cams.xww.de/ [image referer, dga, malware, parked, ads]",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://stackabuse.com/assets/images/apple",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "Alerts: resumethread_remote_process  antivm_generic_disk antisandbox_sleep dynamic_function_loading",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  (iPhone unlocker)",
        "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
        "init.ess.apple.com [backdoor, malicious script, access via media]",
        "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
        "http://intel.net/.about.html",
        "https://twitter.com/sheriffspurlock?lang=en",
        "64.190.63.111 | More AV Detection | !#HSTR:SigGen0136cb6c, ALF:CERT:Adware:Win32/Peapoon , ALF:HeraklezEval:Exploit:O97M/CVE-2017-11882.DR!rfn ,  ALF:HeraklezEval:PUA:Win32/4Shared ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:TrojanDownloader:HTML/Adodb!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Dofoil!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Ymacco!rfn ,  ALF:HeraklezEval:VirTool:WinNT/Rootkitdrv.HK ,  ALF:JASYP:Backdoor:Win32/FlyAgent!atmn ...",
        "http://pl.gov-zaloguj.info",
        "https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30 | https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "LockBit 3.0 Ransomware Affiliates"
          ],
          "malware_families": [
            "Dark power",
            "Comspec",
            "Win.trojan.zbot-9880005-0",
            "Brontok",
            "Worm:win32/autorun.xxy!bit",
            "Zegost",
            "Trojan.mirai/genericrxui",
            "Trojan:win32/fugrafa",
            "Pws:win32/vb.cu",
            "'win32:trojan-gen",
            "Worm:logo/logic",
            "Ratel",
            "Unruy",
            "Artro",
            "Mimikatz",
            "Blacknet rat",
            "Network rat",
            "Formbook",
            "Hacktool",
            "Tel:trojandownloader:o97m/msiexecabuse",
            "Gopher",
            "Lumma stealer",
            "Raccoon",
            "Ascii exploit",
            "Lockbit",
            "Trojanspy:win32/swisyn",
            "Worm:win32/mofksys.b",
            "Trojandropper:win32/zegost.b",
            "Trojan:win32/comspec",
            "Ransomware",
            "Njrat",
            "Redline stealer",
            "Qbot",
            "Trojanspy",
            "Crypt3.blxp",
            "Relic",
            "#lowfi:scpt:kiraasciiobfuscator",
            "Opencandy",
            "Backdoor:win32/simda",
            "Worm:win32/benjamin",
            "Etpro trojan",
            "Meterpreter",
            "Trojanx",
            "Worm:win32/mofksys.rnd!mtb",
            "Virus:win32/floxif.h",
            "Cobalt strike",
            "Lolkek",
            "Qakbot",
            "Emotet",
            "Win.packed.zusy-7170176-0",
            "Win32:malwarex-gen",
            "Trojan:msil/clipbanker.gb!mtb",
            "Quasar rat",
            "Tulach",
            "Tofsee",
            "Et"
          ],
          "industries": [
            "Healthcare",
            "Civil society",
            "Government",
            "Telecommunications",
            "Private sector",
            "Education"
          ],
          "unique_indicators": 138825
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/sanfoundry.com",
    "whois": "http://whois.domaintools.com/sanfoundry.com",
    "domain": "sanfoundry.com",
    "hostname": "test.sanfoundry.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 21,
  "pulses": [
    {
      "id": "68f7582b2454d926e77db68c",
      "name": "AWS does have issues - Indictor removal service impacting threat hunting services",
      "description": "Malicious. I hope the pulse posted yesterday didn\u2019t lead to AWS outage. I learned about it a few a few hours ago. AWS does have issues, like having a monopoly and the type of services allowed to exist on their servers. I never  saw the links until I learned. I appreciate tips , opinions , and sharing.received. An issue found on targets old iOS 14 device ,due to deletions . This  had me researching a link that  is related to multiple links researched before. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship). There are many other malicious indicators.",
      "modified": "2025-11-20T06:00:01.014000",
      "created": "2025-10-21T09:53:47.767000",
      "tags": [
        "url http",
        "url https",
        "united",
        "sweden",
        "canada",
        "search",
        "type indicator",
        "added active",
        "related pulses",
        "aws",
        "passive dns",
        "urls",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "safe browsing",
        "present jun",
        "present sep",
        "present aug",
        "present jul",
        "present oct",
        "present may",
        "ip address",
        "uruguay unknown",
        "india showing",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "unknown",
        "write",
        "read",
        "unknown www",
        "et trojan",
        "suspicious",
        "read c",
        "myagrent",
        "get myagrent",
        "win32",
        "malware",
        "ids detections",
        "et",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "pcratgh0st cnc",
        "backdoor family",
        "show",
        "ms windows",
        "trojandropper",
        "code",
        "next",
        "polymorphic",
        "indicator role",
        "title added",
        "active related",
        "report spam",
        "threat hunters",
        "brian",
        "sabey created",
        "day ago",
        "white indicator",
        "sabey",
        "worm",
        "emotet",
        "tags",
        "malware family",
        "ck ids",
        "t1140",
        "information",
        "t1045",
        "packing",
        "t1060",
        "dns",
        "role title",
        "filehashmd5",
        "malware attacks",
        "find encrypted",
        "pulses url",
        "q oct",
        "dns",
        "ators show",
        "tbmvid",
        "sourcelnms",
        "ipv4",
        "types",
        "indicators show"
      ],
      "references": [
        "business-support.intel.com \u2022 dns0.org \u2022 http://g-ns-1047.awsdns-20.org/",
        "Alerts: physical_drive_access deletes_executed_files anomalous_deletefile",
        "Alerts: suspicious_iocontrol_codes polymorphic static_pe_anomaly suricata_alert",
        "Alerts: injection_rwx antivm_checks_available_memory queries_computer_name",
        "Alerts: resumethread_remote_process  antivm_generic_disk antisandbox_sleep dynamic_function_loading",
        "Alerts: enumerates_running_processes reads_self packer_unknown_pe_section_name contains_pe_overlay dropper queries_keyboard_layout",
        "102 Yara Detections: XOR_embeded_exefile_xored_with_round_256_bytes_key",
        "More PE Packer Microsoft Visual C++  Compilation | File Type PEXE - PE32 executable (GUI) Intel 80386, for MS Windows",
        "IDS Detections: Backdoor family PCRat/Gh0st CnC traffic Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND)",
        "Contacted ipp.getcash2018.com conf.f.360.cn",
        "All IP\u2019s Contacted  27.102.115.143  199.232.210.172 Domains",
        "IDS Detections: Backdoor family PCRat/Gh0st CnC traffic Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND)",
        "New? patch-aws-8y03-v202542-266-2.space.prod.a0core.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Zegost",
          "display_name": "Zegost",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Zegost.B",
          "display_name": "TrojanDropper:Win32/Zegost.B",
          "target": "/malware/TrojanDropper:Win32/Zegost.B"
        },
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        },
        {
          "id": "Trojan:Win32/Fugrafa",
          "display_name": "Trojan:Win32/Fugrafa",
          "target": "/malware/Trojan:Win32/Fugrafa"
        },
        {
          "id": "Win32:MalwareX-gen",
          "display_name": "Win32:MalwareX-gen",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1224,
        "URL": 2979,
        "domain": 609,
        "FileHash-SHA256": 765,
        "FileHash-SHA1": 350,
        "FileHash-MD5": 374,
        "CVE": 1,
        "email": 1
      },
      "indicator_count": 6303,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "150 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d32648280eb859dfca1c19",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:48.037000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 234,
      "modified_text": "566 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d3264283628d23b8f28b9d",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:42.621000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "566 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b85e73efe2e053366ed972",
      "name": "https://www.hallrender.com/attorney/brian-sabey/",
      "description": "",
      "modified": "2024-09-05T06:21:34.047000",
      "created": "2024-01-30T02:26:59.218000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658b74ee93a0b0dc9c960cee",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6145,
        "URL": 14252,
        "hostname": 4778,
        "domain": 6809,
        "CVE": 3
      },
      "indicator_count": 32339,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "591 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aaba128167bfe90a0ab7e8",
      "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
      "description": "",
      "modified": "2024-02-17T02:03:48.897000",
      "created": "2024-01-19T18:06:10.095000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "contacted",
        "referrer",
        "whois record",
        "communicating",
        "highly targeted",
        "apple ios",
        "tsara brashears",
        "core",
        "hacktool",
        "emotet",
        "copy",
        "installer",
        "formbook",
        "ransomware",
        "critical",
        "benjamin",
        "phishing",
        "trojan",
        "worm",
        "date",
        "passive dns",
        "urls",
        "search",
        "status",
        "nxdomain",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "getprocaddress",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "unicode text",
        "pattern match",
        "file",
        "indicator",
        "mitre att",
        "path",
        "factory",
        "hybrid",
        "general",
        "united",
        "as40528 icann",
        "unknown",
        "as26710 icann",
        "pulse pulses",
        "showing",
        "as16876 icann",
        "aaaa",
        "certificate",
        "domain",
        "gandi sas",
        "files",
        "adware",
        "cybercrime",
        "malvertizing",
        "password stealer",
        "ios unlocker",
        "beautiful",
        "model",
        "songwriter",
        "pornhub",
        "fireeye",
        "espionage",
        "targeting"
      ],
      "references": [
        "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
        "nr-data.net [Apple Private Data Collection]",
        "https://stackabuse.com/assets/images/apple",
        "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
        "CVE-2023-4966",
        "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
        "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
        "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
      ],
      "public": 1,
      "adversary": "LockBit 3.0 Ransomware Affiliates",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [
        "Government",
        "Civil society",
        "Private Sector",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "65a89d024f9153ccae3a8500",
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 2869,
        "URL": 2492,
        "CVE": 2,
        "domain": 1079,
        "hostname": 817,
        "SSLCertFingerprint": 2,
        "email": 3
      },
      "indicator_count": 7358,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aaba12436a318c6567cba8",
      "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
      "description": "",
      "modified": "2024-02-17T02:03:48.897000",
      "created": "2024-01-19T18:06:10.934000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "contacted",
        "referrer",
        "whois record",
        "communicating",
        "highly targeted",
        "apple ios",
        "tsara brashears",
        "core",
        "hacktool",
        "emotet",
        "copy",
        "installer",
        "formbook",
        "ransomware",
        "critical",
        "benjamin",
        "phishing",
        "trojan",
        "worm",
        "date",
        "passive dns",
        "urls",
        "search",
        "status",
        "nxdomain",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "getprocaddress",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "unicode text",
        "pattern match",
        "file",
        "indicator",
        "mitre att",
        "path",
        "factory",
        "hybrid",
        "general",
        "united",
        "as40528 icann",
        "unknown",
        "as26710 icann",
        "pulse pulses",
        "showing",
        "as16876 icann",
        "aaaa",
        "certificate",
        "domain",
        "gandi sas",
        "files",
        "adware",
        "cybercrime",
        "malvertizing",
        "password stealer",
        "ios unlocker",
        "beautiful",
        "model",
        "songwriter",
        "pornhub",
        "fireeye",
        "espionage",
        "targeting"
      ],
      "references": [
        "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
        "nr-data.net [Apple Private Data Collection]",
        "https://stackabuse.com/assets/images/apple",
        "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
        "CVE-2023-4966",
        "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
        "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
        "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
      ],
      "public": 1,
      "adversary": "LockBit 3.0 Ransomware Affiliates",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [
        "Government",
        "Civil society",
        "Private Sector",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "65a89d024f9153ccae3a8500",
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 2869,
        "URL": 2492,
        "CVE": 2,
        "domain": 1079,
        "hostname": 817,
        "SSLCertFingerprint": 2,
        "email": 3
      },
      "indicator_count": 7358,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aaba0fe5834eef98066f6e",
      "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
      "description": "",
      "modified": "2024-02-17T02:03:48.897000",
      "created": "2024-01-19T18:06:07.730000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "contacted",
        "referrer",
        "whois record",
        "communicating",
        "highly targeted",
        "apple ios",
        "tsara brashears",
        "core",
        "hacktool",
        "emotet",
        "copy",
        "installer",
        "formbook",
        "ransomware",
        "critical",
        "benjamin",
        "phishing",
        "trojan",
        "worm",
        "date",
        "passive dns",
        "urls",
        "search",
        "status",
        "nxdomain",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "getprocaddress",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "unicode text",
        "pattern match",
        "file",
        "indicator",
        "mitre att",
        "path",
        "factory",
        "hybrid",
        "general",
        "united",
        "as40528 icann",
        "unknown",
        "as26710 icann",
        "pulse pulses",
        "showing",
        "as16876 icann",
        "aaaa",
        "certificate",
        "domain",
        "gandi sas",
        "files",
        "adware",
        "cybercrime",
        "malvertizing",
        "password stealer",
        "ios unlocker",
        "beautiful",
        "model",
        "songwriter",
        "pornhub",
        "fireeye",
        "espionage",
        "targeting"
      ],
      "references": [
        "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
        "nr-data.net [Apple Private Data Collection]",
        "https://stackabuse.com/assets/images/apple",
        "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
        "CVE-2023-4966",
        "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
        "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
        "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
      ],
      "public": 1,
      "adversary": "LockBit 3.0 Ransomware Affiliates",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [
        "Government",
        "Civil society",
        "Private Sector",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "65a89d024f9153ccae3a8500",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 2869,
        "URL": 2492,
        "CVE": 2,
        "domain": 1079,
        "hostname": 817,
        "SSLCertFingerprint": 2,
        "email": 3
      },
      "indicator_count": 7358,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a89d024f9153ccae3a8500",
      "name": "LockBit | Apple iOS HackTool | CVE 2023-4966 (Citrix Bleed)",
      "description": "LockBit seeks initial access to target networks primarily through purchased access, unpatched vulnerabilities, insider access, and zero-day exploits. \n\nCVE 2023-4966 (Citrix Bleed) to bypass password requirements and multifactor authentication (MFA), leading to successful session hijacking of legitimate user sessions on Citrix NetScaler web application delivery control (ADC) and Gateway appliances.",
      "modified": "2024-02-17T02:03:48.897000",
      "created": "2024-01-18T03:37:38.334000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "contacted",
        "referrer",
        "whois record",
        "communicating",
        "highly targeted",
        "apple ios",
        "tsara brashears",
        "core",
        "hacktool",
        "emotet",
        "copy",
        "installer",
        "formbook",
        "ransomware",
        "critical",
        "benjamin",
        "phishing",
        "trojan",
        "worm",
        "date",
        "passive dns",
        "urls",
        "search",
        "status",
        "nxdomain",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "getprocaddress",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "unicode text",
        "pattern match",
        "file",
        "indicator",
        "mitre att",
        "path",
        "factory",
        "hybrid",
        "general",
        "united",
        "as40528 icann",
        "unknown",
        "as26710 icann",
        "pulse pulses",
        "showing",
        "as16876 icann",
        "aaaa",
        "certificate",
        "domain",
        "gandi sas",
        "files",
        "adware",
        "cybercrime",
        "malvertizing",
        "password stealer",
        "ios unlocker",
        "beautiful",
        "model",
        "songwriter",
        "pornhub",
        "fireeye",
        "espionage",
        "targeting"
      ],
      "references": [
        "http://103.246.145.111/gate.php?hwid=WALKER-PC-WALKER&os=Windows%207%20Enterprise&cpu=Intel",
        "nr-data.net [Apple Private Data Collection]",
        "https://stackabuse.com/assets/images/apple",
        "https://hybrid-analysis.com/sample/772d7c597071913ba41e1b0f6b24bbb9d512cbe8f884e482a2d187f5a95281bc/65a880b7d29f11c8c30ad32e",
        "CVE-2023-4966",
        "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a",
        "What Is LockBit Ransomware? BlackBerry https://www.blackberry.com \u203a ransomware-protection",
        "https://github.com/MISP/misp-galaxy/blame/master/clusters/threat-actor.json"
      ],
      "public": 1,
      "adversary": "LockBit 3.0 Ransomware Affiliates",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [
        "Government",
        "Civil society",
        "Private Sector",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 2869,
        "URL": 2492,
        "CVE": 2,
        "domain": 1079,
        "hostname": 817,
        "SSLCertFingerprint": 2,
        "email": 3
      },
      "indicator_count": 7358,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a0012061cc62dae1423a4d",
      "name": "Masquerading | UCHealth| 'University of Cincinnati' | MITRE ATT&CK",
      "description": "",
      "modified": "2024-02-10T08:00:08.779000",
      "created": "2024-01-11T14:54:24.703000",
      "tags": [
        "json data",
        "localappdata",
        "temp",
        "windir",
        "getprocaddress",
        "ascii text",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "path",
        "win64",
        "date",
        "factory",
        "hybrid",
        "contacted",
        "germany unknown",
        "as47846",
        "as31103 keyweb",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "urls",
        "files",
        "benjamin",
        "network",
        "cams",
        "feeds",
        "malicious adware",
        "urlref",
        "worm"
      ],
      "references": [
        "https://my.uchealth.com/myuchealth/Authentication/Login/DoJump?token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJ1cm46VUNIZWFsdGg6Y2Utc",
        "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
        "voyour-cams.xww.de [W32.DSS.Trojan]",
        "https://www.hybrid-analysis.com/sample/5cde83981d63661bad25f5900043e2dacaae3aac005b1201d7ea8182c0ec427c/659e999528b388097206d52c",
        "http://voyour-cams.xww.de/ [image referer, dga, malware, parked, ads]",
        "UCHealth 'University of Cincinnati'  vulnerable/compromised/related 'UCHealth.com' domains and URL's",
        "allaboutcircuits.com l DGA domain | treehugger.com [ueleconomy.gov] | uchealth.com | http://cancer.uchealth.com | https://cancer.uchealth.com",
        "https://cancer.uchealth.com/ | http://michaela.young@uchealth.com/ | https://www.uchealth.com/physician/frank-avilucea/ |",
        "https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30 | https://www.uchealth.com/physician/t-toan-le/?ref=35&site=30",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf",
        "Malicious File Hash- SHA256  98a2a9c25e6240e44c595a693ed7b48c9c412969855b219e46dd9379006673d3",
        "High severity - suspicious_write_exe, network_icmp, modifies_certificates, process_martian, injection_resumethread",
        "Medium severity - dumped_buffer js_eval network_http allocates_rwx antisandbox_foregroundwindows creates_exe creates_shortcut suspicious_process stealth_window uses_windows_utilities recon_fingerprint antivm_memory_available Less High Priority IP\u2019s Contacted 16 IP\u2019s Contacted  104.16.18.94  104.20.234.39  104.26.11.189  104.26.3.202  13.107.4.50 More Domains Contacted 17 Domains Contacted www.bing.com www.allaboutcircuits.com allaboutcircuits.com ocsp.digicert.com securepubads.g.doubleclick.net More Related",
        "https://api2018.uchealth.com/apihc/tass/webportal/apihealthcare_live/default.aspx",
        "http://uchealth.com/wp-content/uploads/2017/12/UCHealthInsuranceIndex_120417.pdf | https://www.uchealth.com/locations/uc-health-physicians-office-midtown/",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=labdetail&e%E2%80%A64bK43QgfcL6kD9bT8hI9YIXWVk5xuOPWrqJQNWVGZwZo-3D&printmode=true",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24wYBOtOuf1BKR-2B8XDFJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24wYBOtOuf1BKR-2B8XDFJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "64.190.63.111 | More AV Detection | !#HSTR:SigGen0136cb6c, ALF:CERT:Adware:Win32/Peapoon , ALF:HeraklezEval:Exploit:O97M/CVE-2017-11882.DR!rfn ,  ALF:HeraklezEval:PUA:Win32/4Shared ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:TrojanDownloader:HTML/Adodb!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Dofoil!rfn ,  ALF:HeraklezEval:TrojanDownloader:Win32/Ymacco!rfn ,  ALF:HeraklezEval:VirTool:WinNT/Rootkitdrv.HK ,  ALF:JASYP:Backdoor:Win32/FlyAgent!atmn ...",
        "High severity - LokiBot User-Agent (Charon/Inferno) Win32.Worm.Benjamin.A CnC Checkin Worm.Mydoom Checkin User-Agent (explwer)",
        "Win32/Fosniw MacTryCnt CnC Style Checkin Win32/SniperSpy Checkin LDPinch Checkin Post Win32.Sality-GR Checkin ADWARE/InstallCore.Gen Checkin LokiBot Checkin .",
        "cdn.porngifs.com, porngifs.com, http://girlscam.xww.de, httpvoyour-cams.xww.de [urlref]",
        "Worm:Win32/Benjamin",
        "https://otx.alienvault.com/malware/Worm:Win32%2FBenjamin/samples"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1132.001",
          "name": "Standard Encoding",
          "display_name": "T1132.001 - Standard Encoding"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 4,
        "FileHash-SHA1": 3,
        "URL": 829,
        "domain": 681,
        "hostname": 264,
        "FileHash-SHA256": 1927
      },
      "indicator_count": 3708,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "799 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659f8c2ff1f9c7a3e3605199",
      "name": "ET MALWARE LokiBot User (Charon/Inferno) Worm:Win32/Benjamin",
      "description": "https://otx.alienvault.com/malware/Worm:Win32%2FBenjamin/\n \nhttps://www.hybrid-analysis.com/sample/3e6f749f6f10dbe471cd14b6441135cdea582f429c523b20d149b335d5b192d2",
      "modified": "2024-02-10T06:03:44.899000",
      "created": "2024-01-11T06:35:27.311000",
      "tags": [
        "name verdict",
        "falcon sandbox",
        "getprocaddress",
        "windir",
        "path",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "indicator",
        "file",
        "pattern match",
        "win64",
        "date",
        "open",
        "factory",
        "hybrid",
        "general",
        "config"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 7,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 1371,
        "hostname": 165,
        "SSLCertFingerprint": 2,
        "URL": 653,
        "domain": 693,
        "email": 1
      },
      "indicator_count": 2895,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "799 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://test.sanfoundry.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://test.sanfoundry.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776627754.231742
}