{
  "type": "URL",
  "indicator": "https://w.test.check.r.map",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://w.test.check.r.map",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3187992900,
      "indicator": "https://w.test.check.r.map",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69c1bd40f81db45dc044697c",
          "name": "Masterkey Clone By CallmeDoris",
          "description": "",
          "modified": "2026-03-23T22:22:56.940000",
          "created": "2026-03-23T22:22:56.940000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "642db7b656049e54b2f71c20",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "26 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c954a80675ccc89b0e9b63",
          "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
          "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
          "modified": "2025-10-16T12:03:14.279000",
          "created": "2025-09-16T12:14:32.327000",
          "tags": [
            "ttl value",
            "extraction",
            "data upload",
            "failed",
            "extra data",
            "include review",
            "exclude sugges",
            "stop",
            "line",
            "path",
            "polyline",
            "getprocaddress",
            "circle",
            "span",
            "ck id",
            "mitre att",
            "ck matrix",
            "null",
            "error",
            "open",
            "spinner",
            "title",
            "code",
            "iframe",
            "window",
            "void",
            "infinity",
            "crypto",
            "footer",
            "generator",
            "general",
            "format",
            "click",
            "strings",
            "meta",
            "install",
            "encoder",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "file defense",
            "adversaries",
            "calls",
            "reads",
            "defense evasion",
            "model",
            "server",
            "registrar abuse",
            "ascio",
            "contact phone",
            "admin city",
            "admin country",
            "admin postal",
            "dnssec",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "urls",
            "files location",
            "united",
            "flag united",
            "a domains",
            "search",
            "unknown aaaa",
            "certificate",
            "yara detections",
            "av detections",
            "ids detections",
            "alerts",
            "entries elf",
            "filehash",
            "name servers",
            "servers",
            "moved",
            "script script",
            "aaaa",
            "unknown ns",
            "domain add",
            "formbook cnc",
            "checkin",
            "lowfi",
            "mtb jun",
            "github pages",
            "twitter",
            "accept",
            "cryptobit",
            "extra",
            "referen data",
            "trojanproxy",
            "dynamicloader",
            "high",
            "write c",
            "medium",
            "intel",
            "ms windows",
            "entries",
            "pe32",
            "explorer",
            "worm",
            "write",
            "next",
            "trojan",
            "hellspawn",
            "md5 add",
            "malware",
            "data",
            "included iocs",
            "script urls",
            "script domains",
            "gmt content",
            "cash amtincart",
            "expirestue",
            "domain related",
            "sea x",
            "accept encoding",
            "request id",
            "body doctype",
            "apache",
            "encrypt",
            "skynet",
            "third eye tv",
            "calling",
            "delete app",
            "potus",
            "mtb aug",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "utilads",
            "trojandropper",
            "mtb sep",
            "win32upatre aug",
            "yara rule",
            "as15169",
            "guard",
            "smartassembly",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "domain",
            "url analysis",
            "files",
            "date",
            "delete service",
            "45470",
            "text",
            "hybrid",
            "present sep",
            "body",
            "fastly error",
            "please",
            "xor xor",
            "sha256 add",
            "analysis date",
            "file score",
            "detections alf",
            "june",
            "delphi",
            "attempts",
            "yara",
            "high security",
            "file type",
            "pe packer",
            "ransom"
          ],
          "references": [
            "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
            "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
            "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
            "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
            "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
            "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
            "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
            "hasownproperty.call \u2022 fireeye.grhd.",
            "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "TrojanProxy:Win32/Malynfits",
              "display_name": "TrojanProxy:Win32/Malynfits",
              "target": "/malware/TrojanProxy:Win32/Malynfits"
            },
            {
              "id": "Virus:Win32/Lywer",
              "display_name": "Virus:Win32/Lywer",
              "target": "/malware/Virus:Win32/Lywer"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "Virus:DOS/Hellspawn",
              "display_name": "Virus:DOS/Hellspawn",
              "target": "/malware/Virus:DOS/Hellspawn"
            },
            {
              "id": "Win.Trojan.Dialer-266",
              "display_name": "Win.Trojan.Dialer-266",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Remcos",
              "display_name": "Backdoor:MSIL/Remcos",
              "target": "/malware/Backdoor:MSIL/Remcos"
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "#LowFI:VBExpensiveLoop",
              "display_name": "#LowFI:VBExpensiveLoop",
              "target": null
            },
            {
              "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "ALF:Ransom:Win32/Babax.SG!MTB",
              "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 690,
            "URL": 1479,
            "domain": 476,
            "FileHash-MD5": 526,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 1509,
            "email": 6
          },
          "indicator_count": 5191,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "185 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892e73b32af18aa302df0dc",
          "name": "Part 1.5",
          "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
          "modified": "2025-09-05T04:03:06.929000",
          "created": "2025-08-06T05:25:15.369000",
          "tags": [
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "june",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "impact",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "script",
            "mitre att",
            "pattern match",
            "show technique",
            "iframe",
            "refresh",
            "august",
            "general",
            "local",
            "tools",
            "demo",
            "look",
            "verify",
            "restart",
            "url http",
            "small",
            "pulses url",
            "tellyoun",
            "showing",
            "entries",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "cc08",
            "f06a6b",
            "sfurl",
            "filehashsha256",
            "types",
            "indicators show",
            "search",
            "pulses",
            "filehashsha1",
            "adversaries",
            "found",
            "webp image",
            "ascii text",
            "riff",
            "size",
            "encrypt",
            "legacy",
            "filehashmd5",
            "united",
            "flag",
            "server",
            "markmonitor",
            "name server",
            "llc name",
            "overview dns",
            "requests domain",
            "country",
            "win32",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "yara",
            "detections",
            "malware",
            "copy",
            "show",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "extraction",
            "data upload",
            "enter sc",
            "type",
            "extra data",
            "please",
            "failed",
            "review",
            "exclude data",
            "included review",
            "ic data",
            "suggeste",
            "stop",
            "type onow",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "safe browsing",
            "sc data",
            "extr amanuav",
            "review included",
            "manualy",
            "sugges excluded",
            "filehash",
            "md5 add",
            "pulse pulses",
            "url add",
            "http",
            "hostname",
            "files domain",
            "pulses otx",
            "virustotal",
            "hsmi192547107",
            "pulses hostname",
            "r dec",
            "customer dec",
            "iski dec",
            "decision dec",
            "va dec",
            "bitcoin",
            "bitcoin dec",
            "petra",
            "torstatus dec",
            "paul dec",
            "sodesc",
            "planet dec",
            "emilia",
            "heroin dec",
            "difference dec",
            "palantir dec",
            "loraxlive dec",
            "chaturbate dec",
            "sandra",
            "free dec",
            "marvel dec",
            "benjis dec",
            "fresh dec",
            "sodesc dec",
            "srdirport",
            "srhostname",
            "link dec",
            "types of",
            "italy",
            "china",
            "australia",
            "france",
            "turkey",
            "discovery",
            "information",
            "ck ids",
            "t1005",
            "local system",
            "t1007",
            "system service",
            "part",
            "track",
            "locate",
            "political",
            "civil society",
            "news",
            "created",
            "hours ago",
            "report spam",
            "t1555",
            "password",
            "t1560",
            "collected data",
            "t1573",
            "channel",
            "t1574",
            "execution flow",
            "scan",
            "iocs",
            "t1497",
            "u0lhmq",
            "mtawmq",
            "t1480",
            "guardrails",
            "t1486",
            "data encrypted",
            "learn more",
            "unsubscribe aug",
            "protocol",
            "t1074",
            "staged",
            "t1083",
            "t1102",
            "web service",
            "t1105",
            "tool transfer",
            "t1140",
            "data engineer",
            "candidate",
            "tlsv1",
            "odigicert inc",
            "stcalifornia",
            "lsan jose",
            "oadobe systems",
            "incorporated",
            "cndigicert sha2",
            "push",
            "next",
            "high",
            "write c",
            "ireland as16509",
            "delete",
            "dirty",
            "tags",
            "t1012",
            "flow endpoint",
            "security scan",
            "t1106",
            "copyright",
            "levelblue"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 608,
            "FileHash-SHA1": 433,
            "FileHash-SHA256": 3663,
            "URL": 17104,
            "domain": 1316,
            "email": 39,
            "hostname": 4208,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 27388,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892a73593f73dfc969779b0",
          "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
          "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
          "modified": "2025-09-05T00:03:23.223000",
          "created": "2025-08-06T00:52:05.051000",
          "tags": [
            "url http",
            "small",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "tellyoun",
            "n aug",
            "entries",
            "data upload",
            "extraction",
            "windows error",
            "june",
            "fwd urgent",
            "justice czech",
            "copy sha256",
            "rejectedfailed",
            "timestamp input",
            "message status",
            "actions august",
            "file",
            "actions june",
            "actions may",
            "cta4 https",
            "context related",
            "associated urls",
            "campaigncodedsc",
            "language",
            "uid http",
            "community",
            "sha256",
            "size42b type",
            "submitted",
            "august",
            "april",
            "internal error",
            "previous1",
            "iframe",
            "community score",
            "scan analysis",
            "malicious",
            "intelligence",
            "learn",
            "falcon sandbox",
            "submissions",
            "status",
            "adversaries",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "windows folder",
            "found",
            "dlls",
            "impact",
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9062,
            "domain": 707,
            "hostname": 2318,
            "FileHash-MD5": 86,
            "FileHash-SHA1": 26,
            "FileHash-SHA256": 2096,
            "email": 5,
            "FilePath": 2,
            "URI": 1
          },
          "indicator_count": 14303,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "673dc97604d5c7076da96877",
          "name": "https://www.vgt.pl/js/jquery-3.2.1.min.js",
          "description": "JQuery v3.2.1 is released by the JS Foundation and is based on the code written by Jeremy Chilcot, the co-creator of the popular web browser, JQuery.",
          "modified": "2025-07-31T22:43:55.771000",
          "created": "2024-11-20T11:35:18.167000",
          "tags": [
            "regexp",
            "error",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "js foundation",
            "typeof module",
            "object",
            "date",
            "null"
          ],
          "references": [
            "https://www.vgt.pl/js/jquery-3.2.1.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 172,
            "hostname": 404,
            "URL": 969,
            "domain": 98,
            "FileHash-MD5": 178,
            "FileHash-SHA256": 355,
            "IPv4": 3
          },
          "indicator_count": 2179,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "261 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "664b74b2683dec84891aef96",
          "name": "PrivateLoader is a malware with a module structure that has the capability is to download and execute one or several payloads",
          "description": "http://185.172.128.69/batushka/inte.exe  \nhttp://185.172.128.69/allnewumm.exe\nhttp://185.172.128.69/brandumma.exe\nhttp://185.172.128.69/files\nhttp://185.172.128.69/files/US.file\nhttp://185.172.128.69/latestumma.exe\nhttp://185.172.128.69/newumma.exe\nhttp://185.172.128.69/sekundumma.exe\nhttp://185.172.128.69/ummanew.exe",
          "modified": "2024-10-14T20:36:05.361000",
          "created": "2024-05-20T16:05:06.313000",
          "tags": [
            "stdin via",
            "nextron",
            "powershell id",
            "powershell",
            "tim rauch",
            "elastic",
            "script block",
            "logging",
            "pe32",
            "ms windows",
            "intel",
            "nazwa typ",
            "md5 nazwa",
            "procesu"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7268,
            "domain": 1310,
            "URL": 8101,
            "FileHash-SHA1": 1615,
            "hostname": 2590,
            "FileHash-MD5": 1852,
            "email": 267,
            "SSLCertFingerprint": 3,
            "CIDR": 38,
            "CVE": 7,
            "IPv4": 15,
            "YARA": 4
          },
          "indicator_count": 23070,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 135,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66577ac0e1788e544c312e3f",
          "name": "Backdoor:MSIL/Noancooe.A  | Network sniffing Lime bandit",
          "description": "Backdoor:MSIL/Noancooe.A: Backdoor arrives on a system as a file dropped by other malware or as a file downloaded giving  malicious hackers unauthorized access and control of your PC.",
          "modified": "2024-06-28T18:00:33.800000",
          "created": "2024-05-29T18:58:08.465000",
          "tags": [
            "algorithm",
            "full name",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "date",
            "code",
            "first",
            "server",
            "privacy notice",
            "aaaa",
            "google",
            "july",
            "xcitium verdict",
            "record type",
            "ttl value",
            "data",
            "name verdict",
            "falcon sandbox",
            "jpeg image",
            "jfif standard",
            "ascii text",
            "pattern match",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "et tor",
            "path",
            "mask",
            "hybrid",
            "generator",
            "local",
            "click",
            "strings",
            "union",
            "#metoo",
            "russell mcveagh",
            "grope",
            "moved",
            "civicaig",
            "now hiring",
            "apple",
            "unknown",
            "a domains",
            "passive dns",
            "urls",
            "creation date",
            "status",
            "search",
            "expiration date",
            "hong kong",
            "as133775 xiamen",
            "germany unknown",
            "scan endpoints",
            "all scoreblue",
            "body",
            "next",
            "hacking",
            "critical",
            "jailbreak",
            "m",
            "tech",
            "hit",
            "men",
            "sreredrum",
            "lime",
            "as24940 hetzner",
            "cname",
            "germany",
            "as16276",
            "domain",
            "spain unknown",
            "as31898 oracle",
            "as396982 google",
            "as5617 orange",
            "poland unknown",
            "as8881",
            "as19905",
            "msil",
            "kiwis",
            "sabey data centers",
            "nemtih",
            "attack tsara brashears",
            "t phone",
            "t mail",
            "t",
            "lakewood",
            "arvada",
            "jeff reimer dpt",
            "jeffrey scott",
            "lakeside",
            "grey st",
            "capture",
            "aquire",
            "aig",
            "sammie",
            "smith",
            "johnson",
            "xfinity",
            "whisper",
            "sky",
            "cybercrime",
            "true",
            "cyprus",
            "attack path",
            "pattern match"
          ],
          "references": [
            "www.russellmcveagh.com - Law Firm (front?) Document Moved",
            "Russell McVeagh - New Zealand's leading commercial law firm, known as the go-to team for tackling complex legal problems.",
            "www.auth.civicalg.com.sni.cloudflaressl.com | civicalg.com",
            "It's all the same | AIG, Michael Roberts Rexxfield 'bounty hunter' Brian Sabey HallRender (?)",
            "This area is swarming with PI's (his , hers and theirs)",
            "Hired hackers to jailbreak and locate devices. Brute forces, business and personal devices, network attacked.",
            "Crime scene unit vans from different county.",
            "Front Range security guard w/unsolicited account of on premise hacker causeing outage. Why would he be 'in the know, or giving information?",
            "sonar.lg-nonprod.civicalg.com (dangerous) peneservice71.auth.civicalg.com, install.civicalg.com",
            "#MeToo - A former Russell McVeagh partner found guilty of \"disgraceful\" sexual misconduct at the heart of New Zealand's #MeToo movement.",
            "http://droid--apk-ru.webpkgcache.com/",
            "http://e.name/?C.push.apply | https://application.t.email/backscreen",
            "appleread.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/Noancooe.A",
              "display_name": "Backdoor:MSIL/Noancooe.A",
              "target": "/malware/Backdoor:MSIL/Noancooe.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 695,
            "URL": 1111,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 17,
            "FileHash-SHA256": 230,
            "domain": 643,
            "email": 9,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 2718,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "659 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a54a663b348b34b12f97",
          "name": "Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-12-06T16:46:02.873000",
          "created": "2023-12-06T16:46:02.873000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a47560e3f989a5556289",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:29.567000",
          "created": "2023-12-06T16:42:29.567000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a46fe2f276b4a4daa9f7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:23.297000",
          "created": "2023-12-06T16:42:23.297000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a468597b81d280b67f3b",
          "name": "199.59.243.224 Command and Control",
          "description": "",
          "modified": "2023-12-06T16:42:16.587000",
          "created": "2023-12-06T16:42:16.587000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709fad03b8f1cdc6abe334",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "",
          "modified": "2023-12-06T16:22:04.700000",
          "created": "2023-12-06T16:22:04.700000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a271fd1e3c22cf63f86",
          "name": "iCloud - cant access due to insecure conx - yes everything here is compromised via chaining, neural ai and accessibilty kit emulated via android",
          "description": "",
          "modified": "2023-12-06T15:58:31.832000",
          "created": "2023-12-06T15:58:31.832000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 705,
            "domain": 302,
            "FileHash-SHA256": 840,
            "URL": 2603,
            "email": 2,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4554,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709929c16e0817dea8f7ff",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-12-06T15:54:17.119000",
          "created": "2023-12-06T15:54:17.119000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 963,
            "domain": 255,
            "hostname": 730,
            "URL": 2400,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50,
            "email": 1
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657099064c0c0aa442282397",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-12-06T15:53:42.077000",
          "created": "2023-12-06T15:53:42.077000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1040,
            "domain": 293,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56,
            "hostname": 809,
            "URL": 2661,
            "email": 1
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709786808aed5d8ee43d19",
          "name": "auto_open_controller.js - all the things using this .js file ;-(",
          "description": "",
          "modified": "2023-12-06T15:47:18.949000",
          "created": "2023-12-06T15:47:18.949000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 380,
            "URL": 802,
            "domain": 245,
            "hostname": 231,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708efbe1108a2df26f5c5f",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "",
          "modified": "2023-12-06T15:10:51.712000",
          "created": "2023-12-06T15:10:51.712000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 538,
            "hostname": 307,
            "domain": 220,
            "URL": 1053
          },
          "indicator_count": 2118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ed8f7d4b5483117bb66",
          "name": "abuse.ch",
          "description": "",
          "modified": "2023-12-06T15:10:16.397000",
          "created": "2023-12-06T15:10:16.397000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 223,
            "domain": 383,
            "URL": 1639,
            "hostname": 560,
            "email": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2808,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e254b734f1efd8bd0ad",
          "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
          "description": "",
          "modified": "2023-12-06T15:07:17.380000",
          "created": "2023-12-06T15:07:17.380000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1645,
            "URL": 8598,
            "domain": 1004,
            "hostname": 2066,
            "FileHash-MD5": 3
          },
          "indicator_count": 13316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708dff34f37412488dda2a",
          "name": "Digital Ocean",
          "description": "",
          "modified": "2023-12-06T15:06:38.991000",
          "created": "2023-12-06T15:06:38.991000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 703,
            "domain": 734,
            "URL": 5116,
            "hostname": 1266,
            "email": 3
          },
          "indicator_count": 7823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d657f0895a860febf8f",
          "name": "SafeFrame Container",
          "description": "",
          "modified": "2023-12-06T15:04:05.932000",
          "created": "2023-12-06T15:04:05.932000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1416,
            "domain": 2979,
            "URL": 8250,
            "hostname": 2262
          },
          "indicator_count": 14907,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cdd2f63f24552fa3e39",
          "name": "BLNWX.COM",
          "description": "",
          "modified": "2023-12-06T15:01:49.772000",
          "created": "2023-12-06T15:01:49.772000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 400,
            "URL": 1905,
            "domain": 494,
            "hostname": 707
          },
          "indicator_count": 3506,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cca842536f1582636be",
          "name": "apeiron.global",
          "description": "",
          "modified": "2023-12-06T15:01:30.558000",
          "created": "2023-12-06T15:01:30.558000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 498,
            "hostname": 388,
            "domain": 242,
            "CVE": 1,
            "URL": 1203,
            "FileHash-MD5": 1
          },
          "indicator_count": 2333,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657089b1d50beac095ca3859",
          "name": "forgotten45s.com",
          "description": "",
          "modified": "2023-12-06T14:48:17.639000",
          "created": "2023-12-06T14:48:17.639000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 500,
            "hostname": 362,
            "domain": 356,
            "URL": 1063,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 22,
            "FileHash-SHA1": 16
          },
          "indicator_count": 2327,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570805953274b32ec1f981b",
          "name": "Votebuilder.com",
          "description": "",
          "modified": "2023-12-06T14:08:25.588000",
          "created": "2023-12-06T14:08:25.588000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 869,
            "domain": 834,
            "URL": 4755,
            "hostname": 1559,
            "CIDR": 2,
            "FileHash-MD5": 10
          },
          "indicator_count": 8029,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6507d7f6b7377c6661892549",
          "name": " Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-09-18T04:54:14.378000",
          "created": "2023-09-18T04:54:14.378000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "944 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61e6dadf56df268be36",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:42.532000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61b16728d0a29c7b6a7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:39.783000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a5daf00fa294f0454541",
          "name": "199.59.243.224 Command and Control ",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:54:34.352000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d90dda3a7763b24267102d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d90dda3a7763b24267102d",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "Wannacry, Malware, Trojans, evaders, executables, Droppers,Trickbots,malware on discord Artemis, B.Scope adware Artemis, CVE, Apple phishing ,cve-2014-3931\ncve-2005-0068\ncve-2015-1701\ncve-2004-0790\ncve-2008-2938\ncve-2009-1535\ncve-2009-0233\ncve-2014-6345\ncontains-embedded-js\ncontains-elf\ncve-2008-1447\ncve-1999-0016\nnsis\nattachment\nupx\ncve-2016-2569\ncve-2017-0147\ncontains-pe\nbobsoft\nRulesets:\nTrickBot  \nAPT10_Malware_Sample_Gen  \nRuleset:\n(smtp) unknown command\nSURICATA SMTP Mime base64-decoding failed\nSURICATA SMTP Mime encoded line len exceeded\nSURICATA Applayer Detect protocol only one direction\nFile Found over SMTP and stored\nUnique rule identifier:\nPrivate collection.\nMALWARE\nRANSOM \nMALWARE RANSOM\nworm.mydoom/emailworm\ntrojan.wannacry/wannacryptor\ntrojan.heye/msil\nTrojan: LotAccessUI.EXE ( Win32 EXE \nexecutable\nwindows\nwin32\npe\npeexe\nMagic\t\nPE32 \nMITRE ATT&CK Navigator\nExecution\nTA0002\nPrivilege Escalation\nTA0004\nDefense Evasion\nTA0005\nCredential Access\nTA0006\nDiscovery\nTA0007\nCollection\nTA0009",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-08-13T17:07:38.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6457df59f333c9e3027ac390",
          "name": "iCloud - cant access due to insecure conx - yes everything here is compromised via chaining, neural ai and accessibilty kit emulated via android",
          "description": "thisi s from scan 25 april 2023 \nlets compare to 2020",
          "modified": "2023-05-07T17:36:13.269000",
          "created": "2023-05-07T17:26:49.285000",
          "tags": [
            "chromeua",
            "optout",
            "windir",
            "prefetch8 ansi",
            "fatalerror",
            "facebook",
            "meta",
            "unknown",
            "suspicious",
            "null",
            "body",
            "black",
            "iframe",
            "media",
            "qakbot",
            "icloud",
            "apple"
          ],
          "references": [
            "https://www.icloud.com",
            "https://www.hybrid-analysis.com/sample/d3ffdf44916b01e14fceca04c3a3beb5fbad5aeea482e2242c5a843793073874/6447a07b59116aba3303e517"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2603,
            "hostname": 705,
            "domain": 302,
            "FileHash-SHA256": 840,
            "email": 2,
            "IPv4": 10,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4564,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1077 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642fbeba84c7b4cbee43200a",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-05-07T00:00:36.624000",
          "created": "2023-04-07T06:56:58.157000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "august",
            "body",
            "path",
            "close",
            "format",
            "template",
            "suspicious",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "meta",
            "chat",
            "this",
            "small",
            "june",
            "footer",
            "window",
            "legend",
            "hybrid",
            "click",
            "null",
            "april",
            "general",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2400,
            "hostname": 730,
            "domain": 255,
            "FileHash-SHA256": 963,
            "email": 1,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1078 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642db7b656049e54b2f71c20",
          "name": "masterkey.com.ua/download/MKClientSetup.exe - hybrid 100/100",
          "description": "The entire \"Ad\" eco system is compromised via all main channels , ie google, bing, msn etc utilising many top level domains and brands, its truly the biggest suppky chain attack ever known. So enormously thats its unbelievable and I guess many peeps just cant see it because its simply to overwhelming to consider a reality p plus many perhaps cant digest the advanced use of AI and self repairing neural networks along that are designed to work on standard default configs. its not till you step out of the defaults that you start to see nefariousness",
          "modified": "2023-05-05T16:00:23.366000",
          "created": "2023-04-05T18:02:30.403000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1080 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6428649b535c12c6f8d60b0b",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-05-01T15:05:10.466000",
          "created": "2023-04-01T17:06:35.022000",
          "tags": [
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "path",
            "null",
            "entropy",
            "click",
            "template",
            "date",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "quicksearch",
            "this",
            "suspicious",
            "window",
            "legend",
            "hybrid",
            "hosts",
            "next",
            "main",
            "refresh",
            "hello",
            "voice",
            "malicious",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2661,
            "hostname": 809,
            "domain": 293,
            "FileHash-SHA256": 1040,
            "email": 1,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1084 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6426181ff6ddb7ccafbfac76",
          "name": "v2 - front.viewinter.ai - plus all suggested ioc's",
          "description": "",
          "modified": "2023-04-29T23:04:49.088000",
          "created": "2023-03-30T23:15:43.500000",
          "tags": [],
          "references": [
            "f_00023a .js - 225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053",
            "f_000243 .js - 312571a21f35168fbed9342d755e5df0a56a053c75bd58c6aa837351f28aa0f5",
            "https://hybrid-analysis.com/sample/cb3eb59660aaf4566fc75ec8d4088942fcfd40b6a65e4832cf619ba4c56b5f15",
            "https://hybrid-analysis.com/sample/225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053",
            "https://hybrid-analysis.com/sample/225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053/6421e770b2b593f60c066418",
            "Part RU .js - daa8547f1dbc8c994eed3725f3076aaf6c4e298b963fb712e53eb0fa2dc1e789"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 641,
            "domain": 68,
            "hostname": 118,
            "FileHash-SHA256": 46,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 2
          },
          "indicator_count": 882,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1085 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6426dda295502d82e6e6ef7f",
          "name": "v4 - Hybrid scan uploaded  + all suggested ioc's - vendor.3a0e728a.js another gem in edge on twitter.com/i/flow/login source code",
          "description": "WebpackChunk_Twitter-responsive_web is built on a single web address, which will allow users to upload images, tweets and videos to be stored in the same place as the hashtag.",
          "modified": "2023-03-31T13:18:26.733000",
          "created": "2023-03-31T13:18:26.733000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "memoryfile scan",
            "error",
            "runtime data",
            "typeof e",
            "regexp",
            "array",
            "object",
            "typeof t",
            "void",
            "null",
            "unknown",
            "path",
            "facebook",
            "4096",
            "suspicious",
            "meta",
            "lazy",
            "entity",
            "union",
            "body",
            "idkey",
            "scroll",
            "backspace",
            "insert",
            "roboto",
            "target",
            "stack",
            "hybrid",
            "model",
            "click",
            "stream",
            "strings",
            "qakbot",
            "pattern match",
            "ud801",
            "ud804",
            "ud805",
            "ud806",
            "ud81a",
            "ud835",
            "ud800",
            "ud802",
            "sha1",
            "sha256",
            "vendor.3a0e728a.js"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 222,
            "domain": 221,
            "FileHash-SHA256": 85,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1115 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed8628367c1a4f3f8e773a",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:26:00.959000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed86228ecb2b03d35b046f",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:25:54.305000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63f619404ba8714b7e063140",
          "name": "auto_open_controller.js - all the things using this .js file ;-(",
          "description": "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609",
          "modified": "2023-02-22T13:31:44.806000",
          "created": "2023-02-22T13:31:44.806000",
          "tags": [
            "memoryfile scan",
            "null",
            "runtime data",
            "void",
            "unknown",
            "android",
            "magento",
            "desktop",
            "dark",
            "scroll",
            "addressbar",
            "trigger",
            "template",
            "fast",
            "burn",
            "homepage",
            "class",
            "critical",
            "iframe",
            "lick",
            "open",
            "trace",
            "sapphire",
            "screen",
            "small",
            "close",
            "click",
            "ransomware",
            "strings",
            "malicious",
            "contains",
            "xnnew weakmap",
            "fnnew weakmap",
            "auto_open_controller.js",
            "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609/63f3dde5af1db0386635b153",
            "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 380,
            "URL": 802,
            "hostname": 231,
            "domain": 245,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1152 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63a3b9aaaca8891186e6f7a2",
          "name": "vt errors on edge 21 dec 2022",
          "description": "var n-i,n-n, r.test, is a new type of webpack, which uses a set of rules to store data in the form of a single address, or code.",
          "modified": "2023-01-21T00:01:41.590000",
          "created": "2022-12-22T01:58:02.495000",
          "tags": [
            "eaca",
            "eace",
            "iaca",
            "iace",
            "boolean",
            "object",
            "path",
            "aacf",
            "customevent",
            "string",
            "span",
            "error",
            "code",
            "virustotal",
            "date",
            "null",
            "contact",
            "blank",
            "close",
            "twitter",
            "unknown",
            "download",
            "this",
            "easy",
            "desktop",
            "body",
            "requires",
            "footer",
            "refresh",
            "patch",
            "write",
            "cobalt strike",
            "shell",
            "zero",
            "harmless",
            "main",
            "aalfe",
            "getclass",
            "copy",
            "iframe",
            "divi",
            "roboto",
            "insert",
            "template",
            "class",
            "void",
            "form",
            "back",
            "ransomware",
            "trace",
            "comment",
            "tools",
            "premium",
            "bufferwriter",
            "bufferreader",
            "array",
            "typeerror",
            "vtuibutton",
            "number",
            "typeof o",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d651",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "references": [
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BufferReader",
              "display_name": "BufferReader",
              "target": null
            },
            {
              "id": "BufferWriter",
              "display_name": "BufferWriter",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1051,
            "FileHash-SHA256": 204,
            "hostname": 275,
            "domain": 212,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1745,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1184 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e80d56fba248bac0744780",
          "name": "\ud83e\udd14\ud83d\udea8 Could this be the source of all Evil? \ud83d\udea8\ud83e\udd14 Nubotnet - Team:KU Leuven/test2 - 2021.igem.org",
          "description": "",
          "modified": "2022-08-31T00:01:05.509000",
          "created": "2022-08-01T17:28:54.991000",
          "tags": [
            "apt",
            "runtime data",
            "decrypted ssl",
            "pcap",
            "windows nt",
            "tops",
            "cookie",
            "typeof t",
            "element",
            "error",
            "matrix",
            "typeerror",
            "bmfloor",
            "frameelement",
            "null",
            "skew",
            "parade"
          ],
          "references": [
            "https://2021.igem.org/Team:KU_Leuven/test2",
            "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1696,
            "domain": 586,
            "hostname": 613,
            "FileHash-SHA256": 533,
            "FileHash-MD5": 34,
            "FileHash-SHA1": 33,
            "email": 1
          },
          "indicator_count": 3496,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1327 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e1ca167a1591e7b4ca1129",
          "name": "VirusTotal view-source on https://www.virustotal.com/en/file/undefined/analysis/",
          "description": "someone really needs to figure out wtf this is all doing it has to be part of the net.sh",
          "modified": "2022-07-28T02:05:04.183000",
          "created": "2022-07-27T23:28:22.504000",
          "tags": [
            "array",
            "object",
            "typeof t",
            "layer1",
            "error",
            "path",
            "function",
            "typeerror",
            "date",
            "svg export",
            "span",
            "null",
            "unknown",
            "click",
            "february",
            "april",
            "june",
            "august",
            "this",
            "void",
            "bounce",
            "string",
            "regexp",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "notfound",
            "contenttype",
            "form",
            "copyright",
            "element",
            "polymer project",
            "authors",
            "bsd style",
            "code",
            "google",
            "software",
            "window",
            "generator",
            "comment",
            "trident",
            "typeof e",
            "typeof symbol",
            "typeof btoa",
            "btoa",
            "typeof reflect",
            "boolean",
            "customevent",
            "plugin",
            "build",
            "home",
            "intelligence",
            "graph",
            "report",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/en/file/undefined/analysis/",
            "net.sh"
          ],
          "references": [
            "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
            "14.main.bundle.91f9f7ff635e0b797de3.js",
            "5.main.bundle.e92e5e24e074f9c2a52b.js",
            "0.main.bundle.a9d68f5204cd3ac257b6.js",
            "webcomponent-polyfill.js",
            "analytics.js",
            "12.main.bundle.50be73a11d1d3745a5ee.js",
            "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
            "https://www.virustotal.com/en/file/undefined/analysis/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1538,
            "FileHash-SHA256": 138,
            "hostname": 363,
            "domain": 235
          },
          "indicator_count": 2274,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1361 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628e790d414886e18b33c262",
          "name": "either emotet or a part of it",
          "description": "var a.tldDomains, AWIN.Tracking.com, has a new name for its basket, but how do you find it in your browser?.. and what does this mean?",
          "modified": "2022-06-24T00:01:00.706000",
          "created": "2022-05-25T18:44:29.280000",
          "tags": [
            "tfunction",
            "cnullvvoid",
            "wnullgvoid",
            "bnullhvoid",
            "gnullcvoid",
            "guidewrapper",
            "blog",
            "lfunction",
            "hotjar",
            "iab2",
            "code",
            "number",
            "party",
            "n strictly",
            "life spann",
            "azuren n",
            "cookie tracking",
            "tablen n",
            "n cookies",
            "cookie",
            "null",
            "date",
            "error",
            "ffffff",
            "typeof t",
            "uint16array",
            "regexp",
            "uint8array",
            "array",
            "uint32array",
            "helvetica",
            "void",
            "execution",
            "body",
            "roboto",
            "prop",
            "object",
            "param",
            "cookies",
            "getcookie",
            "name",
            "typeof",
            "uri component",
            "obj2",
            "typeof e",
            "webkit",
            "component",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "function",
            "typeof n",
            "typeof window",
            "uuidv4",
            "ajsanonymousid",
            "suffix",
            "bill",
            "viewed",
            "pavel krayzel",
            "psd2",
            "bt prorata",
            "amex",
            "squad",
            "march",
            "new visitors",
            "promise",
            "nthis",
            "eventprocessor",
            "typeof define",
            "info",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "window",
            "value",
            "customevent",
            "image",
            "samesitelax",
            "invalid pixel",
            "snap",
            "afaf09",
            "sfunction",
            "cfunction",
            "post",
            "appcuesdeps",
            "typeerror",
            "hki3",
            "ogr1",
            "typeof self",
            "full selector",
            "heatmaps",
            "sans",
            "version",
            "releaseid",
            "appcues",
            "dashboard2",
            "dashboard3",
            "technology",
            "selector",
            "click",
            "next",
            "import",
            "generic",
            "started",
            "dismissed",
            "completed",
            "contextual help",
            "symbol",
            "appcuesfunction",
            "widget",
            "iframe",
            "pnull",
            "html",
            "style",
            "ctnull",
            "fanull",
            "license",
            "ynull",
            "config",
            "meta",
            "accept",
            "contabo gmbh",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "safari",
            "firefox",
            "chrome",
            "remove",
            "edge",
            "correct",
            "section",
            "segoe ui",
            "emoji",
            "opera",
            "path",
            "span",
            "this",
            "typeof document",
            "small",
            "blank",
            "pass",
            "core",
            "footer",
            "close",
            "form",
            "main",
            "direct",
            "reduceright",
            "string",
            "f420",
            "gyfpnzbgtf3",
            "copyright",
            "json",
            "sesprops",
            "href",
            "input",
            "class",
            "logger",
            "target",
            "push",
            "awalt",
            "awinawin",
            "explorer",
            "awatp",
            "ccampid",
            "impid",
            "tag1"
          ],
          "references": [
            "https://www.dwin1.com/13976.js",
            "https://cdn.heapanalytics.com/js/heap-3501642718.js",
            "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
            "https://contabo.com/client/client.a529db28.js",
            "https://contabo.com/client/client-30e55c50.css",
            "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
            "https://l.clarity.ms/s/0.6.34/clarity.js",
            "https://www.clarity.ms/tag/uet/5739677",
            "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
            "https://fast.appcues.com/79878.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
            "https://sc-static.net/scevent.min.js",
            "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
            "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
            "https://www.hotjar.com/ensureSegmentId.js",
            "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
            "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
            "https://www.hotjar.com/persistUtmParams.js",
            "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
            "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
            "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 349,
            "hostname": 456,
            "URL": 1730,
            "FileHash-SHA256": 342,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1395 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62844b9aeadcab773b3eb51a",
          "name": "DATAHATA - data-xata",
          "description": "ChunkLoadError, a new type of error, failed to load a chunk of JavaScript, according to the web browser operator, E.noconflict.com, as well as the website itself.",
          "modified": "2022-06-16T00:01:26.112000",
          "created": "2022-05-18T01:27:54.809000",
          "tags": [
            "zendesk",
            "integration",
            "offline form",
            "routing website",
            "acquire",
            "english",
            "chatsupport",
            "livechat",
            "genesys dx",
            "drift",
            "live",
            "chat",
            "android",
            "contact",
            "twitter",
            "facebook",
            "fast",
            "enterprise",
            "small",
            "demo",
            "leave",
            "premium",
            "easy",
            "robin",
            "tbody",
            "span",
            "jost",
            "object",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "typeof content",
            "array",
            "error",
            "footer",
            "nuxtlink",
            "combo",
            "cookie",
            "please",
            "cancel",
            "email",
            "zendesk chat",
            "sorry",
            "back",
            "name",
            "function",
            "document",
            "click",
            "close",
            "null",
            "hello",
            "noraid",
            "datav57c71c16",
            "raid0",
            "raid1",
            "raid5",
            "raid6",
            "raid10",
            "republic",
            "islands",
            "rating",
            "guinea",
            "reviewstab",
            "samoa",
            "china",
            "congo",
            "korea",
            "united",
            "albania",
            "armenia",
            "belarus",
            "chad",
            "cuba",
            "indonesia",
            "mexico",
            "panama",
            "paraguay",
            "slovakia",
            "ukraine",
            "uruguay",
            "bitcoin",
            "script",
            "date",
            "scroll",
            "mousemove",
            "touchstart",
            "setaccount",
            "trackpageview",
            "textjavascript",
            "datalayer",
            "gtmngp6lxc",
            "number",
            "string",
            "trackevent",
            "click button",
            "copyright",
            "host",
            "path",
            "order",
            "typeerror",
            "typeof symbol",
            "typeof e",
            "typeof t",
            "referenceerror",
            "promise",
            "boolean",
            "typeof n"
          ],
          "references": [
            "https://www.googletagmanager.com/gtm.js?id=GTM-NGP6LXC",
            "https://www.data-xata.com/js/zopimlaunch.js",
            "https://www.data-xata.com/_nuxt/1e8744d.modern.js",
            "https://www.data-xata.com/_nuxt/65d6cfa.modern.js",
            "https://www.data-xata.com/_nuxt/b799d37.modern.js",
            "https://www.data-xata.com/_nuxt/e7424e3.js",
            "xfe-URL-Data-xata.com-stix2-2.1-export.json",
            "https://zopim.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1531",
              "name": "Account Access Removal",
              "display_name": "T1531 - Account Access Removal"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "E-Commerce"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 329,
            "URL": 968,
            "FileHash-SHA256": 245,
            "domain": 241,
            "FileHash-MD5": 1,
            "email": 1
          },
          "indicator_count": 1785,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1403 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280921bfbaf2aace62511f1",
          "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
          "description": "Alibaba",
          "modified": "2022-06-14T00:00:05.659000",
          "created": "2022-05-15T05:39:39.040000",
          "tags": [
            "typeerror",
            "object",
            "typeof t",
            "symbol",
            "typeof e",
            "typeof self",
            "webpackrequire",
            "typeof n",
            "json",
            "math",
            "body",
            "copyright",
            "apoorv saxena",
            "typeof",
            "typeof define",
            "detect ie",
            "typeof document",
            "substring",
            "\u963f\u91cc\u5df4\u5df4\uff0c1688\uff0c\u5fae\u5546\uff0c\u5fae\u5e97\uff0c\u8d27\u6e90\uff0c\u5973\u88c5\u6279\u53d1\uff0c\u7537\u88c5\uff0cb2b\uff0c\u6279\u53d1\uff0c\u91c7\u8d2d",
            "typeof symbol",
            "promise",
            "error",
            "date",
            "createclass",
            "array",
            "this",
            "typeof lib",
            "null",
            "mozilla",
            "regexp",
            "typeof require",
            "xmlhttprequest",
            "license",
            "xdomainrequest",
            "aplusscore",
            "s1e4",
            "cfunction",
            "html5",
            "span",
            "button",
            "android",
            "jupdate",
            "void",
            "webview",
            "kraken",
            "nundefined",
            "xfunction",
            "zfunction",
            "chrome",
            "xuexi",
            "nullj",
            "area",
            "mtopwvplugin",
            "activexobject",
            "post",
            "options",
            "function",
            "head",
            "delete",
            "false",
            "trace",
            "patch",
            "unknown",
            "alipay",
            "ff6a00",
            "opacity100",
            "opacity0",
            "f2f3f7",
            "e6e7eb",
            "f7f8fa",
            "helvetica neue",
            "helvetica",
            "tahoma",
            "arial",
            "\u963f\u91cc\u5df4\u5df4\uff0c\u91c7\u8d2d\u6279\u53d1\uff0c1688\uff0c\u884c\u4e1a\u95e8\u6237\uff0c\u7f51\u4e0a\u8d38\u6613\uff0cb2b\uff0c\u7535\u5b50\u5546\u52a1\uff0c\u5185\u8d38\uff0c\u5916\u8d38\uff0c\u6279\u53d1\uff0c\u884c\u4e1a\u8d44\u8baf\uff0c\u7f51\u4e0a\u8d38\u6613\uff0c\u7f51\u4e0a\u4ea4\u6613\uff0c\u4ea4\u6613\u5e02\u573a\uff0c\u5728",
            "1688",
            "1000",
            "yunos",
            "lazada",
            "http response",
            "gmt contenttype",
            "vary"
          ],
          "references": [
            "xfe-URL-1688.com-stix2-2.1-export.json",
            "xfe-IP-47.89.52.178-stix2-2.1-export.json",
            "https://page.1688.com/shtml/static/wrongpage.html",
            "http://polyfill.alicdn.com/",
            "xfe-URL-Alijk.com-stix2-2.1-export.json",
            "http://i.alicdn.com/",
            "http://is.alicdn.com/",
            "http://1688.com/",
            "https://mind.1688.com/wap/wapsy/dke4eosa0/index.html?no_cache=true&pageId=1150842&cms_id=1150842&src=desktop",
            "xfe-URL-mind.1688.com-stix2-2.1-export.json",
            "https://g.alicdn.com/secdev/sufei_data/3.9.9/index.js",
            "https://g.alicdn.com/alilog/mlog/aplus_wap.js",
            "https://mind.1688.com/zsh/zsh/d9my57ugj/index.html",
            "https://gw.alipayobjects.com/os/lib/lozad/1.16.0/dist/lozad.min.js",
            "http://g.alicdn.com/assets-group/croco/0.0.8/index.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8598,
            "hostname": 2066,
            "domain": 1004,
            "FileHash-SHA256": 1645,
            "FileHash-MD5": 3
          },
          "indicator_count": 13316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1405 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "v6s.js",
        "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
        "http://e.name/?C.push.apply | https://application.t.email/backscreen",
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "beacon.js",
        "xfe-URL-Data-xata.com-stix2-2.1-export.json",
        "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
        "https://www.data-xata.com/_nuxt/e7424e3.js",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "http://droid--apk-ru.webpkgcache.com/",
        "xfe-URL-1688.com-stix2-2.1-export.json",
        "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c",
        "https://hybrid-analysis.com/sample/225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053",
        "https://hybrid-analysis.com/sample/12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609/63f3dde5af1db0386635b153",
        "http://is.alicdn.com/",
        "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
        "https://2021.igem.org/Team:KU_Leuven/test2",
        "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
        "https://www.hotjar.com/persistUtmParams.js",
        "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
        "https://l.clarity.ms/s/0.6.34/clarity.js",
        "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
        "https://www.dwin1.com/13976.js",
        "sonar.lg-nonprod.civicalg.com (dangerous) peneservice71.auth.civicalg.com, install.civicalg.com",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "5.main.bundle.e92e5e24e074f9c2a52b.js",
        "https://mind.1688.com/zsh/zsh/d9my57ugj/index.html",
        "Russell McVeagh - New Zealand's leading commercial law firm, known as the go-to team for tackling complex legal problems.",
        "https://gw.alipayobjects.com/os/lib/lozad/1.16.0/dist/lozad.min.js",
        "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
        "https://www.data-xata.com/js/zopimlaunch.js",
        "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
        "https://www.clarity.ms/tag/uet/5739677",
        "webpack   buildin global.js",
        "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NGP6LXC",
        "#MeToo - A former Russell McVeagh partner found guilty of \"disgraceful\" sexual misconduct at the heart of New Zealand's #MeToo movement.",
        "http://i.alicdn.com/",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d",
        "https://fast.appcues.com/79878.js",
        "14.main.bundle.91f9f7ff635e0b797de3.js",
        "apstag.js",
        "This area is swarming with PI's (his , hers and theirs)",
        "https://hybrid-analysis.com/sample/cb3eb59660aaf4566fc75ec8d4088942fcfd40b6a65e4832cf619ba4c56b5f15",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "https://www.hotjar.com/ensureSegmentId.js",
        "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0",
        "SlotBuilder.ts",
        "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
        "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
        "12.main.bundle.50be73a11d1d3745a5ee.js",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d",
        "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png",
        "https://page.1688.com/shtml/static/wrongpage.html",
        "http://g.alicdn.com/assets-group/croco/0.0.8/index.js",
        "https://contabo.com/client/client.a529db28.js",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "https://g.alicdn.com/alilog/mlog/aplus_wap.js",
        "https://www.hybrid-analysis.com/sample/d3ffdf44916b01e14fceca04c3a3beb5fbad5aeea482e2242c5a843793073874/6447a07b59116aba3303e517",
        "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js",
        "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
        "Hired hackers to jailbreak and locate devices. Brute forces, business and personal devices, network attacked.",
        "xfe-URL-Alijk.com-stix2-2.1-export.json",
        "http://1688.com/",
        "https://www.virustotal.com/en/file/undefined/analysis/",
        "appleread.net",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "Front Range security guard w/unsolicited account of on premise hacker causeing outage. Why would he be 'in the know, or giving information?",
        "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
        "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "It's all the same | AIG, Michael Roberts Rexxfield 'bounty hunter' Brian Sabey HallRender (?)",
        "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
        "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
        "https://contabo.com/client/client-30e55c50.css",
        "https://sc-static.net/scevent.min.js",
        "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
        "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js",
        "https://www.icloud.com",
        "f_000243 .js - 312571a21f35168fbed9342d755e5df0a56a053c75bd58c6aa837351f28aa0f5",
        "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609",
        "0.main.bundle.a9d68f5204cd3ac257b6.js",
        "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225",
        "Part RU .js - daa8547f1dbc8c994eed3725f3076aaf6c4e298b963fb712e53eb0fa2dc1e789",
        "https://www.data-xata.com/_nuxt/65d6cfa.modern.js",
        "https://www.vgt.pl/js/jquery-3.2.1.min.js",
        "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551",
        "https://zopim.com",
        "nlsSDK600.bundle.min.js",
        "http://polyfill.alicdn.com/",
        "www.auth.civicalg.com.sni.cloudflaressl.com | civicalg.com",
        "https://hybrid-analysis.com/sample/225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053/6421e770b2b593f60c066418",
        "https://www.data-xata.com/_nuxt/1e8744d.modern.js",
        "xfe-IP-47.89.52.178-stix2-2.1-export.json",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "f_00023a .js - 225016fbe7412fd92296fc35ad54fd9a58a1b747cc6d5c66dd5abb299559b053",
        "https://cdn.heapanalytics.com/js/heap-3501642718.js",
        "webcomponent-polyfill.js",
        "https://www.data-xata.com/_nuxt/b799d37.modern.js",
        "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
        "www.russellmcveagh.com - Law Firm (front?) Document Moved",
        "analytics.js",
        "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
        "xfe-URL-mind.1688.com-stix2-2.1-export.json",
        "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
        "https://mind.1688.com/wap/wapsy/dke4eosa0/index.html?no_cache=true&pageId=1150842&cms_id=1150842&src=desktop",
        "https://g.alicdn.com/secdev/sufei_data/3.9.9/index.js",
        "Crime scene unit vans from different county."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Bufferwriter",
            "Backdoor:msil/remcos",
            "Pws:win32/vb.cu",
            "Requestbuilder",
            "Trojandropper:win32/muldrop.v!mtb",
            "Virus:win32/lywer",
            "Win.trojan.dialer-266",
            "Trojanspy:win32/nivdort",
            "#lowfi:vbexpensiveloop",
            "Bufferreader",
            "Reduceright",
            "Agenttesla",
            "Backdoor:msil/noancooe.a",
            "Tel:trojan:msil/agenttesla.vpa!mtb",
            "Worm:win32/lightmoon.h",
            "Slotbuilder",
            "Alf:ransom:win32/babax.sg!mtb",
            "Virus:dos/hellspawn",
            "Trojanproxy:win32/malynfits"
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Civil society",
            "E-commerce"
          ],
          "unique_indicators": 160202
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/r.map",
    "whois": "http://whois.domaintools.com/r.map",
    "domain": "r.map",
    "hostname": "w.test.check.r.map"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69c1bd40f81db45dc044697c",
      "name": "Masterkey Clone By CallmeDoris",
      "description": "",
      "modified": "2026-03-23T22:22:56.940000",
      "created": "2026-03-23T22:22:56.940000",
      "tags": [
        "dropped file",
        "chromeua",
        "runtime data",
        "drmedgeua",
        "edgeua",
        "generator",
        "win64",
        "null",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "iframe",
        "cookie",
        "meta",
        "body",
        "legend",
        "dwis",
        "core",
        "tear",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "://masterkey.com.ua/download/MKClientSetup.exe"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "642db7b656049e54b2f71c20",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 949,
        "URL": 5642,
        "CVE": 2,
        "domain": 509,
        "FileHash-SHA256": 293,
        "FileHash-MD5": 550,
        "FileHash-SHA1": 60,
        "email": 5
      },
      "indicator_count": 8010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "26 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c954a80675ccc89b0e9b63",
      "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
      "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
      "modified": "2025-10-16T12:03:14.279000",
      "created": "2025-09-16T12:14:32.327000",
      "tags": [
        "ttl value",
        "extraction",
        "data upload",
        "failed",
        "extra data",
        "include review",
        "exclude sugges",
        "stop",
        "line",
        "path",
        "polyline",
        "getprocaddress",
        "circle",
        "span",
        "ck id",
        "mitre att",
        "ck matrix",
        "null",
        "error",
        "open",
        "spinner",
        "title",
        "code",
        "iframe",
        "window",
        "void",
        "infinity",
        "crypto",
        "footer",
        "generator",
        "general",
        "format",
        "click",
        "strings",
        "meta",
        "install",
        "encoder",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "file defense",
        "adversaries",
        "calls",
        "reads",
        "defense evasion",
        "model",
        "server",
        "registrar abuse",
        "ascio",
        "contact phone",
        "admin city",
        "admin country",
        "admin postal",
        "dnssec",
        "http",
        "ip address",
        "passive dns",
        "related nids",
        "urls",
        "files location",
        "united",
        "flag united",
        "a domains",
        "search",
        "unknown aaaa",
        "certificate",
        "yara detections",
        "av detections",
        "ids detections",
        "alerts",
        "entries elf",
        "filehash",
        "name servers",
        "servers",
        "moved",
        "script script",
        "aaaa",
        "unknown ns",
        "domain add",
        "formbook cnc",
        "checkin",
        "lowfi",
        "mtb jun",
        "github pages",
        "twitter",
        "accept",
        "cryptobit",
        "extra",
        "referen data",
        "trojanproxy",
        "dynamicloader",
        "high",
        "write c",
        "medium",
        "intel",
        "ms windows",
        "entries",
        "pe32",
        "explorer",
        "worm",
        "write",
        "next",
        "trojan",
        "hellspawn",
        "md5 add",
        "malware",
        "data",
        "included iocs",
        "script urls",
        "script domains",
        "gmt content",
        "cash amtincart",
        "expirestue",
        "domain related",
        "sea x",
        "accept encoding",
        "request id",
        "body doctype",
        "apache",
        "encrypt",
        "skynet",
        "third eye tv",
        "calling",
        "delete app",
        "potus",
        "mtb aug",
        "backdoor",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "utilads",
        "trojandropper",
        "mtb sep",
        "win32upatre aug",
        "yara rule",
        "as15169",
        "guard",
        "smartassembly",
        "associated urls",
        "date checked",
        "url hostname",
        "server response",
        "domain",
        "url analysis",
        "files",
        "date",
        "delete service",
        "45470",
        "text",
        "hybrid",
        "present sep",
        "body",
        "fastly error",
        "please",
        "xor xor",
        "sha256 add",
        "analysis date",
        "file score",
        "detections alf",
        "june",
        "delphi",
        "attempts",
        "yara",
        "high security",
        "file type",
        "pe packer",
        "ransom"
      ],
      "references": [
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "TrojanProxy:Win32/Malynfits",
          "display_name": "TrojanProxy:Win32/Malynfits",
          "target": "/malware/TrojanProxy:Win32/Malynfits"
        },
        {
          "id": "Virus:Win32/Lywer",
          "display_name": "Virus:Win32/Lywer",
          "target": "/malware/Virus:Win32/Lywer"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "Virus:DOS/Hellspawn",
          "display_name": "Virus:DOS/Hellspawn",
          "target": "/malware/Virus:DOS/Hellspawn"
        },
        {
          "id": "Win.Trojan.Dialer-266",
          "display_name": "Win.Trojan.Dialer-266",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Remcos",
          "display_name": "Backdoor:MSIL/Remcos",
          "target": "/malware/Backdoor:MSIL/Remcos"
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "#LowFI:VBExpensiveLoop",
          "display_name": "#LowFI:VBExpensiveLoop",
          "target": null
        },
        {
          "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "target": null
        },
        {
          "id": "PWS:Win32/VB.CU",
          "display_name": "PWS:Win32/VB.CU",
          "target": "/malware/PWS:Win32/VB.CU"
        },
        {
          "id": "ALF:Ransom:Win32/Babax.SG!MTB",
          "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 690,
        "URL": 1479,
        "domain": 476,
        "FileHash-MD5": 526,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 1509,
        "email": 6
      },
      "indicator_count": 5191,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "185 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892e73b32af18aa302df0dc",
      "name": "Part 1.5",
      "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
      "modified": "2025-09-05T04:03:06.929000",
      "created": "2025-08-06T05:25:15.369000",
      "tags": [
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "june",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "impact",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "script",
        "mitre att",
        "pattern match",
        "show technique",
        "iframe",
        "refresh",
        "august",
        "general",
        "local",
        "tools",
        "demo",
        "look",
        "verify",
        "restart",
        "url http",
        "small",
        "pulses url",
        "tellyoun",
        "showing",
        "entries",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "cc08",
        "f06a6b",
        "sfurl",
        "filehashsha256",
        "types",
        "indicators show",
        "search",
        "pulses",
        "filehashsha1",
        "adversaries",
        "found",
        "webp image",
        "ascii text",
        "riff",
        "size",
        "encrypt",
        "legacy",
        "filehashmd5",
        "united",
        "flag",
        "server",
        "markmonitor",
        "name server",
        "llc name",
        "overview dns",
        "requests domain",
        "country",
        "win32",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "medium risk",
        "yara",
        "detections",
        "malware",
        "copy",
        "show",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "extraction",
        "data upload",
        "enter sc",
        "type",
        "extra data",
        "please",
        "failed",
        "review",
        "exclude data",
        "included review",
        "ic data",
        "suggeste",
        "stop",
        "type onow",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "safe browsing",
        "sc data",
        "extr amanuav",
        "review included",
        "manualy",
        "sugges excluded",
        "filehash",
        "md5 add",
        "pulse pulses",
        "url add",
        "http",
        "hostname",
        "files domain",
        "pulses otx",
        "virustotal",
        "hsmi192547107",
        "pulses hostname",
        "r dec",
        "customer dec",
        "iski dec",
        "decision dec",
        "va dec",
        "bitcoin",
        "bitcoin dec",
        "petra",
        "torstatus dec",
        "paul dec",
        "sodesc",
        "planet dec",
        "emilia",
        "heroin dec",
        "difference dec",
        "palantir dec",
        "loraxlive dec",
        "chaturbate dec",
        "sandra",
        "free dec",
        "marvel dec",
        "benjis dec",
        "fresh dec",
        "sodesc dec",
        "srdirport",
        "srhostname",
        "link dec",
        "types of",
        "italy",
        "china",
        "australia",
        "france",
        "turkey",
        "discovery",
        "information",
        "ck ids",
        "t1005",
        "local system",
        "t1007",
        "system service",
        "part",
        "track",
        "locate",
        "political",
        "civil society",
        "news",
        "created",
        "hours ago",
        "report spam",
        "t1555",
        "password",
        "t1560",
        "collected data",
        "t1573",
        "channel",
        "t1574",
        "execution flow",
        "scan",
        "iocs",
        "t1497",
        "u0lhmq",
        "mtawmq",
        "t1480",
        "guardrails",
        "t1486",
        "data encrypted",
        "learn more",
        "unsubscribe aug",
        "protocol",
        "t1074",
        "staged",
        "t1083",
        "t1102",
        "web service",
        "t1105",
        "tool transfer",
        "t1140",
        "data engineer",
        "candidate",
        "tlsv1",
        "odigicert inc",
        "stcalifornia",
        "lsan jose",
        "oadobe systems",
        "incorporated",
        "cndigicert sha2",
        "push",
        "next",
        "high",
        "write c",
        "ireland as16509",
        "delete",
        "dirty",
        "tags",
        "t1012",
        "flow endpoint",
        "security scan",
        "t1106",
        "copyright",
        "levelblue"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 608,
        "FileHash-SHA1": 433,
        "FileHash-SHA256": 3663,
        "URL": 17104,
        "domain": 1316,
        "email": 39,
        "hostname": 4208,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 27388,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892a73593f73dfc969779b0",
      "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
      "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
      "modified": "2025-09-05T00:03:23.223000",
      "created": "2025-08-06T00:52:05.051000",
      "tags": [
        "url http",
        "small",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "tellyoun",
        "n aug",
        "entries",
        "data upload",
        "extraction",
        "windows error",
        "june",
        "fwd urgent",
        "justice czech",
        "copy sha256",
        "rejectedfailed",
        "timestamp input",
        "message status",
        "actions august",
        "file",
        "actions june",
        "actions may",
        "cta4 https",
        "context related",
        "associated urls",
        "campaigncodedsc",
        "language",
        "uid http",
        "community",
        "sha256",
        "size42b type",
        "submitted",
        "august",
        "april",
        "internal error",
        "previous1",
        "iframe",
        "community score",
        "scan analysis",
        "malicious",
        "intelligence",
        "learn",
        "falcon sandbox",
        "submissions",
        "status",
        "adversaries",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "windows folder",
        "found",
        "dlls",
        "impact",
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 9062,
        "domain": 707,
        "hostname": 2318,
        "FileHash-MD5": 86,
        "FileHash-SHA1": 26,
        "FileHash-SHA256": 2096,
        "email": 5,
        "FilePath": 2,
        "URI": 1
      },
      "indicator_count": 14303,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "673dc97604d5c7076da96877",
      "name": "https://www.vgt.pl/js/jquery-3.2.1.min.js",
      "description": "JQuery v3.2.1 is released by the JS Foundation and is based on the code written by Jeremy Chilcot, the co-creator of the popular web browser, JQuery.",
      "modified": "2025-07-31T22:43:55.771000",
      "created": "2024-11-20T11:35:18.167000",
      "tags": [
        "regexp",
        "error",
        "pseudo",
        "child",
        "sufeffxa0",
        "class",
        "attr",
        "js foundation",
        "typeof module",
        "object",
        "date",
        "null"
      ],
      "references": [
        "https://www.vgt.pl/js/jquery-3.2.1.min.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 172,
        "hostname": 404,
        "URL": 969,
        "domain": 98,
        "FileHash-MD5": 178,
        "FileHash-SHA256": 355,
        "IPv4": 3
      },
      "indicator_count": 2179,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 123,
      "modified_text": "261 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "664b74b2683dec84891aef96",
      "name": "PrivateLoader is a malware with a module structure that has the capability is to download and execute one or several payloads",
      "description": "http://185.172.128.69/batushka/inte.exe  \nhttp://185.172.128.69/allnewumm.exe\nhttp://185.172.128.69/brandumma.exe\nhttp://185.172.128.69/files\nhttp://185.172.128.69/files/US.file\nhttp://185.172.128.69/latestumma.exe\nhttp://185.172.128.69/newumma.exe\nhttp://185.172.128.69/sekundumma.exe\nhttp://185.172.128.69/ummanew.exe",
      "modified": "2024-10-14T20:36:05.361000",
      "created": "2024-05-20T16:05:06.313000",
      "tags": [
        "stdin via",
        "nextron",
        "powershell id",
        "powershell",
        "tim rauch",
        "elastic",
        "script block",
        "logging",
        "pe32",
        "ms windows",
        "intel",
        "nazwa typ",
        "md5 nazwa",
        "procesu"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 7268,
        "domain": 1310,
        "URL": 8101,
        "FileHash-SHA1": 1615,
        "hostname": 2590,
        "FileHash-MD5": 1852,
        "email": 267,
        "SSLCertFingerprint": 3,
        "CIDR": 38,
        "CVE": 7,
        "IPv4": 15,
        "YARA": 4
      },
      "indicator_count": 23070,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 135,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66577ac0e1788e544c312e3f",
      "name": "Backdoor:MSIL/Noancooe.A  | Network sniffing Lime bandit",
      "description": "Backdoor:MSIL/Noancooe.A: Backdoor arrives on a system as a file dropped by other malware or as a file downloaded giving  malicious hackers unauthorized access and control of your PC.",
      "modified": "2024-06-28T18:00:33.800000",
      "created": "2024-05-29T18:58:08.465000",
      "tags": [
        "algorithm",
        "full name",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "date",
        "code",
        "first",
        "server",
        "privacy notice",
        "aaaa",
        "google",
        "july",
        "xcitium verdict",
        "record type",
        "ttl value",
        "data",
        "name verdict",
        "falcon sandbox",
        "jpeg image",
        "jfif standard",
        "ascii text",
        "pattern match",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "united",
        "et tor",
        "path",
        "mask",
        "hybrid",
        "generator",
        "local",
        "click",
        "strings",
        "union",
        "#metoo",
        "russell mcveagh",
        "grope",
        "moved",
        "civicaig",
        "now hiring",
        "apple",
        "unknown",
        "a domains",
        "passive dns",
        "urls",
        "creation date",
        "status",
        "search",
        "expiration date",
        "hong kong",
        "as133775 xiamen",
        "germany unknown",
        "scan endpoints",
        "all scoreblue",
        "body",
        "next",
        "hacking",
        "critical",
        "jailbreak",
        "m",
        "tech",
        "hit",
        "men",
        "sreredrum",
        "lime",
        "as24940 hetzner",
        "cname",
        "germany",
        "as16276",
        "domain",
        "spain unknown",
        "as31898 oracle",
        "as396982 google",
        "as5617 orange",
        "poland unknown",
        "as8881",
        "as19905",
        "msil",
        "kiwis",
        "sabey data centers",
        "nemtih",
        "attack tsara brashears",
        "t phone",
        "t mail",
        "t",
        "lakewood",
        "arvada",
        "jeff reimer dpt",
        "jeffrey scott",
        "lakeside",
        "grey st",
        "capture",
        "aquire",
        "aig",
        "sammie",
        "smith",
        "johnson",
        "xfinity",
        "whisper",
        "sky",
        "cybercrime",
        "true",
        "cyprus",
        "attack path",
        "pattern match"
      ],
      "references": [
        "www.russellmcveagh.com - Law Firm (front?) Document Moved",
        "Russell McVeagh - New Zealand's leading commercial law firm, known as the go-to team for tackling complex legal problems.",
        "www.auth.civicalg.com.sni.cloudflaressl.com | civicalg.com",
        "It's all the same | AIG, Michael Roberts Rexxfield 'bounty hunter' Brian Sabey HallRender (?)",
        "This area is swarming with PI's (his , hers and theirs)",
        "Hired hackers to jailbreak and locate devices. Brute forces, business and personal devices, network attacked.",
        "Crime scene unit vans from different county.",
        "Front Range security guard w/unsolicited account of on premise hacker causeing outage. Why would he be 'in the know, or giving information?",
        "sonar.lg-nonprod.civicalg.com (dangerous) peneservice71.auth.civicalg.com, install.civicalg.com",
        "#MeToo - A former Russell McVeagh partner found guilty of \"disgraceful\" sexual misconduct at the heart of New Zealand's #MeToo movement.",
        "http://droid--apk-ru.webpkgcache.com/",
        "http://e.name/?C.push.apply | https://application.t.email/backscreen",
        "appleread.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:MSIL/Noancooe.A",
          "display_name": "Backdoor:MSIL/Noancooe.A",
          "target": "/malware/Backdoor:MSIL/Noancooe.A"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 695,
        "URL": 1111,
        "FileHash-MD5": 7,
        "FileHash-SHA1": 17,
        "FileHash-SHA256": 230,
        "domain": 643,
        "email": 9,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 2718,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "659 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a54a663b348b34b12f97",
      "name": "Command and Control - 199.59.243.224",
      "description": "",
      "modified": "2023-12-06T16:46:02.873000",
      "created": "2023-12-06T16:46:02.873000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a47560e3f989a5556289",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:29.567000",
      "created": "2023-12-06T16:42:29.567000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a46fe2f276b4a4daa9f7",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:23.297000",
      "created": "2023-12-06T16:42:23.297000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://w.test.check.r.map",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://w.test.check.r.map",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776615183.0884092
}