{
  "type": "URL",
  "indicator": "https://update.myinwallpaper.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://update.myinwallpaper.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4156692508,
      "indicator": "https://update.myinwallpaper.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "69312c4db6fe7eb34abd179d",
          "name": "BeeLineRouter.Net \u2022 Apple \u2022 Worms \u2022 Ransom \u2022 SpyWare",
          "description": "Direct- remotely accesses iOS devices. Same threat actors. Further research warranted.| \n\n#theyswarm #apple #worms #spyware #ransom #quasi",
          "modified": "2026-01-03T05:02:11.376000",
          "created": "2025-12-04T06:38:05.504000",
          "tags": [
            "worm",
            "readme.exe",
            "foto.pif",
            "z1nic.exe",
            "dynamicloader",
            "high",
            "windows",
            "checks",
            "named pipe",
            "http traffic",
            "ids detections",
            "yara detections",
            "alerts",
            "launch",
            "defense evasion",
            "ta0005",
            "files",
            "msie",
            "next dropped",
            "process name",
            "pe32",
            "intel",
            "ms windows",
            "unknown",
            "united",
            "tlsv1",
            "as14618",
            "top source",
            "top destination",
            "port",
            "destination",
            "source source",
            "matches rule",
            "hidden file",
            "extension",
            "connection",
            "http vary",
            "tulach",
            "url https",
            "indicator role",
            "active related",
            "ipv4",
            "url http",
            "macintosh",
            "intel mac",
            "os x",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "bq dec",
            "virtool",
            "win32mydoom dec",
            "trojan",
            "win32cve dec",
            "avast avg",
            "mtb dec",
            "crlf line",
            "unicode text",
            "utf8",
            "ee fc",
            "ff d5",
            "yara rule",
            "ascii text",
            "f0 ff",
            "eb e1",
            "write",
            "malware",
            "suspicious",
            "observed dns",
            "query",
            "exploits",
            "sid name",
            "malware cve",
            "exif data",
            "show",
            "value exe",
            "next",
            "all ipv4",
            "pulse pulses",
            "passive dns",
            "urls",
            "reverse dns",
            "location united",
            "america flag",
            "ashburn",
            "status",
            "name servers",
            "ip address",
            "showing",
            "domain",
            "files ip",
            "windows nt",
            "slcc2",
            "media center",
            "medium",
            "simda",
            "internal",
            "local",
            "write c",
            "domain add",
            "ip whois",
            "registrar",
            "hostname",
            "present jul",
            "unknown ns",
            "present dec",
            "music",
            "servers",
            "hostname add",
            "pulse submit",
            "url analysis",
            "aaaa",
            "backdoor",
            "entries",
            "found",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "record value",
            "emails",
            "win32",
            "mtb may",
            "invalid url",
            "ransom",
            "trojanspy",
            "msil",
            "akamai",
            "expiration date",
            "body html",
            "present nov",
            "url add",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "present sep",
            "present oct",
            "flag",
            "analysis tip",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "date",
            "domain address",
            "dynadot inc",
            "name server",
            "contacted hosts",
            "process details",
            "network traffic",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "t1566",
            "submitted url",
            "t1204",
            "learn",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "access att",
            "t1566 phishing",
            "pattern match",
            "show process",
            "t1071",
            "t1057",
            "general",
            "path",
            "brian sabey",
            "christopher p ahmann",
            "quasi",
            "foundry",
            "helix",
            "remote attacks",
            "hit men",
            "sreredrum",
            "pleh"
          ],
          "references": [
            "apple.com \u2022 getsupport.apple.com \u2022",
            "https://www.idvd.eu/?cid=oas-japac-domains-applestore.com.cn/90.i.lolik.anyciona.patrolita.casse.897866 \u2022 oas-japac-domains-applestore.com.cn",
            "http://beelinerouter.net/",
            "Tulach - 114.114.114.114",
            "http://foundry2-lbl.dvr.dn2.n-helix.com",
            "foundry.com \u2022 helix. com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/Fadok!rfn",
              "display_name": "Worm:Win32/Fadok!rfn",
              "target": "/malware/Worm:Win32/Fadok!rfn"
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "Mydoom",
              "display_name": "Mydoom",
              "target": null
            },
            {
              "id": "Win.Spyware.88778-2",
              "display_name": "Win.Spyware.88778-2",
              "target": null
            },
            {
              "id": "Win.Malware.Delf-10008156-0",
              "display_name": "Win.Malware.Delf-10008156-0",
              "target": null
            },
            {
              "id": "Trojan.MyDoom/Muldrop",
              "display_name": "Trojan.MyDoom/Muldrop",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1578",
              "name": "Modify Cloud Compute Infrastructure",
              "display_name": "T1578 - Modify Cloud Compute Infrastructure"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1584.003",
              "name": "Virtual Private Server",
              "display_name": "T1584.003 - Virtual Private Server"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            },
            {
              "id": "T1408",
              "name": "Disguise Root/Jailbreak Indicators",
              "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 422,
            "FileHash-SHA1": 316,
            "FileHash-SHA256": 1950,
            "domain": 899,
            "URL": 6117,
            "email": 21,
            "hostname": 2037,
            "SSLCertFingerprint": 2,
            "CVE": 1
          },
          "indicator_count": 11765,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "107 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692e8cd886e0bb692e8a9d08",
          "name": "Blocker Ransomware affecting Apple and iCloud  | Injection",
          "description": "Wild! Hackers attack-ack-acking!\nThey\u2019re quite good. Persistent. Angry. \nIt\u2019s the same group of hackers.",
          "modified": "2026-01-01T06:01:02.583000",
          "created": "2025-12-02T06:53:12.823000",
          "tags": [
            "url https",
            "url http",
            "domain",
            "fh no",
            "ipv4",
            "united",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "mitre att",
            "ck id",
            "ck matrix",
            "ascii text",
            "href",
            "network traffic",
            "general",
            "local",
            "click",
            "strings",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "found",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "dynamicloader",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "write c",
            "unknown",
            "virtool",
            "write",
            "defender",
            "malware",
            "delete",
            "alerts",
            "backdoor",
            "high",
            "ip address",
            "t1045",
            "packing",
            "t1055",
            "injection",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1119",
            "t1027",
            "tools",
            "families",
            "mirai",
            "indicator role",
            "active related",
            "hackers",
            "ahmann",
            "usual suspects"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Drixed",
              "display_name": "Backdoor:Win32/Drixed",
              "target": "/malware/Backdoor:Win32/Drixed"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector",
              "display_name": "VirTool:Win32/Injector",
              "target": "/malware/VirTool:Win32/Injector"
            },
            {
              "id": "Ransom:Win32/Blocker.NN!MTB",
              "display_name": "Ransom:Win32/Blocker.NN!MTB",
              "target": "/malware/Ransom:Win32/Blocker.NN!MTB"
            },
            {
              "id": "Unix.Trojan.Mirai-7135937-0",
              "display_name": "Unix.Trojan.Mirai-7135937-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1066",
              "name": "Indicator Removal from Tools",
              "display_name": "T1066 - Indicator Removal from Tools"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1408",
              "name": "Disguise Root/Jailbreak Indicators",
              "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            },
            {
              "id": "T1054",
              "name": "Indicator Blocking",
              "display_name": "T1054 - Indicator Blocking"
            },
            {
              "id": "T1590.002",
              "name": "DNS",
              "display_name": "T1590.002 - DNS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 234,
            "FileHash-SHA1": 219,
            "FileHash-SHA256": 841,
            "URL": 2606,
            "domain": 298,
            "hostname": 772,
            "SSLCertFingerprint": 2,
            "CVE": 1
          },
          "indicator_count": 4973,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "109 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://foundry2-lbl.dvr.dn2.n-helix.com",
        "https://www.idvd.eu/?cid=oas-japac-domains-applestore.com.cn/90.i.lolik.anyciona.patrolita.casse.897866 \u2022 oas-japac-domains-applestore.com.cn",
        "apple.com \u2022 getsupport.apple.com \u2022",
        "foundry.com \u2022 helix. com",
        "Tulach - 114.114.114.114",
        "http://beelinerouter.net/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Virtool:win32/obfuscator",
            "Tofsee",
            "Trojanspy",
            "Unix.trojan.mirai-7135937-0",
            "Mydoom",
            "Mirai",
            "Virtool:win32/injector.gen!bq",
            "Worm:win32/fadok!rfn",
            "Backdoor:win32/drixed",
            "Ransom:win32/blocker.nn!mtb",
            "Win.malware.delf-10008156-0",
            "Win.spyware.88778-2",
            "Trojan.mydoom/muldrop",
            "#virtool:win32/obfuscator.adb",
            "Virtool:win32/injector"
          ],
          "industries": [],
          "unique_indicators": 16278
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/myinwallpaper.com",
    "whois": "http://whois.domaintools.com/myinwallpaper.com",
    "domain": "myinwallpaper.com",
    "hostname": "update.myinwallpaper.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "69312c4db6fe7eb34abd179d",
      "name": "BeeLineRouter.Net \u2022 Apple \u2022 Worms \u2022 Ransom \u2022 SpyWare",
      "description": "Direct- remotely accesses iOS devices. Same threat actors. Further research warranted.| \n\n#theyswarm #apple #worms #spyware #ransom #quasi",
      "modified": "2026-01-03T05:02:11.376000",
      "created": "2025-12-04T06:38:05.504000",
      "tags": [
        "worm",
        "readme.exe",
        "foto.pif",
        "z1nic.exe",
        "dynamicloader",
        "high",
        "windows",
        "checks",
        "named pipe",
        "http traffic",
        "ids detections",
        "yara detections",
        "alerts",
        "launch",
        "defense evasion",
        "ta0005",
        "files",
        "msie",
        "next dropped",
        "process name",
        "pe32",
        "intel",
        "ms windows",
        "unknown",
        "united",
        "tlsv1",
        "as14618",
        "top source",
        "top destination",
        "port",
        "destination",
        "source source",
        "matches rule",
        "hidden file",
        "extension",
        "connection",
        "http vary",
        "tulach",
        "url https",
        "indicator role",
        "active related",
        "ipv4",
        "url http",
        "macintosh",
        "intel mac",
        "os x",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "bq dec",
        "virtool",
        "win32mydoom dec",
        "trojan",
        "win32cve dec",
        "avast avg",
        "mtb dec",
        "crlf line",
        "unicode text",
        "utf8",
        "ee fc",
        "ff d5",
        "yara rule",
        "ascii text",
        "f0 ff",
        "eb e1",
        "write",
        "malware",
        "suspicious",
        "observed dns",
        "query",
        "exploits",
        "sid name",
        "malware cve",
        "exif data",
        "show",
        "value exe",
        "next",
        "all ipv4",
        "pulse pulses",
        "passive dns",
        "urls",
        "reverse dns",
        "location united",
        "america flag",
        "ashburn",
        "status",
        "name servers",
        "ip address",
        "showing",
        "domain",
        "files ip",
        "windows nt",
        "slcc2",
        "media center",
        "medium",
        "simda",
        "internal",
        "local",
        "write c",
        "domain add",
        "ip whois",
        "registrar",
        "hostname",
        "present jul",
        "unknown ns",
        "present dec",
        "music",
        "servers",
        "hostname add",
        "pulse submit",
        "url analysis",
        "aaaa",
        "backdoor",
        "entries",
        "found",
        "next associated",
        "gmt connection",
        "control",
        "content type",
        "twitter",
        "certificate",
        "redirect date",
        "cache",
        "record value",
        "emails",
        "win32",
        "mtb may",
        "invalid url",
        "ransom",
        "trojanspy",
        "msil",
        "akamai",
        "expiration date",
        "body html",
        "present nov",
        "url add",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "present sep",
        "present oct",
        "flag",
        "analysis tip",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "date",
        "domain address",
        "dynadot inc",
        "name server",
        "contacted hosts",
        "process details",
        "network traffic",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "t1566",
        "submitted url",
        "t1204",
        "learn",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "access att",
        "t1566 phishing",
        "pattern match",
        "show process",
        "t1071",
        "t1057",
        "general",
        "path",
        "brian sabey",
        "christopher p ahmann",
        "quasi",
        "foundry",
        "helix",
        "remote attacks",
        "hit men",
        "sreredrum",
        "pleh"
      ],
      "references": [
        "apple.com \u2022 getsupport.apple.com \u2022",
        "https://www.idvd.eu/?cid=oas-japac-domains-applestore.com.cn/90.i.lolik.anyciona.patrolita.casse.897866 \u2022 oas-japac-domains-applestore.com.cn",
        "http://beelinerouter.net/",
        "Tulach - 114.114.114.114",
        "http://foundry2-lbl.dvr.dn2.n-helix.com",
        "foundry.com \u2022 helix. com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/Fadok!rfn",
          "display_name": "Worm:Win32/Fadok!rfn",
          "target": "/malware/Worm:Win32/Fadok!rfn"
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "Mydoom",
          "display_name": "Mydoom",
          "target": null
        },
        {
          "id": "Win.Spyware.88778-2",
          "display_name": "Win.Spyware.88778-2",
          "target": null
        },
        {
          "id": "Win.Malware.Delf-10008156-0",
          "display_name": "Win.Malware.Delf-10008156-0",
          "target": null
        },
        {
          "id": "Trojan.MyDoom/Muldrop",
          "display_name": "Trojan.MyDoom/Muldrop",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1578",
          "name": "Modify Cloud Compute Infrastructure",
          "display_name": "T1578 - Modify Cloud Compute Infrastructure"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1584.003",
          "name": "Virtual Private Server",
          "display_name": "T1584.003 - Virtual Private Server"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        },
        {
          "id": "T1408",
          "name": "Disguise Root/Jailbreak Indicators",
          "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 422,
        "FileHash-SHA1": 316,
        "FileHash-SHA256": 1950,
        "domain": 899,
        "URL": 6117,
        "email": 21,
        "hostname": 2037,
        "SSLCertFingerprint": 2,
        "CVE": 1
      },
      "indicator_count": 11765,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "107 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692e8cd886e0bb692e8a9d08",
      "name": "Blocker Ransomware affecting Apple and iCloud  | Injection",
      "description": "Wild! Hackers attack-ack-acking!\nThey\u2019re quite good. Persistent. Angry. \nIt\u2019s the same group of hackers.",
      "modified": "2026-01-01T06:01:02.583000",
      "created": "2025-12-02T06:53:12.823000",
      "tags": [
        "url https",
        "url http",
        "domain",
        "fh no",
        "ipv4",
        "united",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "mitre att",
        "ck id",
        "ck matrix",
        "ascii text",
        "href",
        "network traffic",
        "general",
        "local",
        "click",
        "strings",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "found",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "dynamicloader",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "write c",
        "unknown",
        "virtool",
        "write",
        "defender",
        "malware",
        "delete",
        "alerts",
        "backdoor",
        "high",
        "ip address",
        "t1045",
        "packing",
        "t1055",
        "injection",
        "t1060",
        "run keys",
        "startup",
        "folder",
        "t1119",
        "t1027",
        "tools",
        "families",
        "mirai",
        "indicator role",
        "active related",
        "hackers",
        "ahmann",
        "usual suspects"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Drixed",
          "display_name": "Backdoor:Win32/Drixed",
          "target": "/malware/Backdoor:Win32/Drixed"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector",
          "display_name": "VirTool:Win32/Injector",
          "target": "/malware/VirTool:Win32/Injector"
        },
        {
          "id": "Ransom:Win32/Blocker.NN!MTB",
          "display_name": "Ransom:Win32/Blocker.NN!MTB",
          "target": "/malware/Ransom:Win32/Blocker.NN!MTB"
        },
        {
          "id": "Unix.Trojan.Mirai-7135937-0",
          "display_name": "Unix.Trojan.Mirai-7135937-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1470",
          "name": "Obtain Device Cloud Backups",
          "display_name": "T1470 - Obtain Device Cloud Backups"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1066",
          "name": "Indicator Removal from Tools",
          "display_name": "T1066 - Indicator Removal from Tools"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1408",
          "name": "Disguise Root/Jailbreak Indicators",
          "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        },
        {
          "id": "T1054",
          "name": "Indicator Blocking",
          "display_name": "T1054 - Indicator Blocking"
        },
        {
          "id": "T1590.002",
          "name": "DNS",
          "display_name": "T1590.002 - DNS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 234,
        "FileHash-SHA1": 219,
        "FileHash-SHA256": 841,
        "URL": 2606,
        "domain": 298,
        "hostname": 772,
        "SSLCertFingerprint": 2,
        "CVE": 1
      },
      "indicator_count": 4973,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "109 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://update.myinwallpaper.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://update.myinwallpaper.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776685588.3785417
}