{
  "type": "URL",
  "indicator": "https://webssofed.itunes.gr/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://webssofed.itunes.gr/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4225453691,
      "indicator": "https://webssofed.itunes.gr/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "69ddeb45c45f6a3cd721397d",
          "name": "Active attacks  \u2022 Apple \u2022 Tulach",
          "description": "Including 360+ Apple\nIoC\u2019s from Malicious Tulac.cc + Virtual Servers Pulses. Ongoing history of malicious attacks, custom malware engineer, malicious media , account control. \n\nI was blocked from VirusToltal. It was Tulach Nextcloud posse. What I am doing now s legal. \n\nReferenced below. URL: \"https://accountapple.com/\" contacted related malicious domain: \"accountapple.com\"\nCONTACTED DOMAIN: \"sqllq.com\" has been identified as malicious",
          "modified": "2026-04-14T07:22:45.250000",
          "created": "2026-04-14T07:22:45.250000",
          "tags": [
            "url http",
            "ipv4",
            "indicator role",
            "active related",
            "united",
            "moved",
            "gmt content",
            "certificate",
            "all domain",
            "msie",
            "chrome",
            "extraction",
            "data upload",
            "twitter",
            "cookie",
            "extra",
            "include data",
            "review locs",
            "exclude",
            "suggested os",
            "onlv",
            "failed",
            "stop data",
            "read c",
            "unicode",
            "rgba",
            "memcommit",
            "delete",
            "dock",
            "write",
            "execution",
            "sc type",
            "extri",
            "include review",
            "exclude sugges",
            "typ data",
            "a domains",
            "present apr",
            "script urls",
            "files",
            "files ip",
            "address",
            "ios",
            "mac",
            "apple",
            "appleid",
            "itunes",
            "next associated",
            "all ipv4",
            "included ic",
            "uny teade",
            "type hostnar",
            "hostnar hostnar",
            "hostnar",
            "macair",
            "macairaustralia",
            "ipad",
            "ipod",
            "cryptexportkey",
            "invalid pointer",
            "cryptgenkey",
            "stream",
            "defender",
            "delphi",
            "class",
            "stack",
            "format",
            "unknown",
            "united states",
            "phishing",
            "password",
            "traffic redirected",
            "service mod",
            "service execution",
            "youtube",
            "music",
            "streams",
            "songs",
            "played songs",
            "music streams",
            "most played",
            "fonelab",
            "indicator",
            "included iocs",
            "manually add",
            "review ocs",
            "exclude inn",
            "sugges data",
            "find",
            "include",
            "url https",
            "enter sc",
            "type",
            "no matchme",
            "search otx",
            "https",
            "references x",
            "analyze",
            "open th",
            "url data",
            "se http",
            "no match",
            "excluded iocs",
            "iocs",
            "ip whitelisted",
            "whitelisted",
            "tcp include",
            "analysis date",
            "file score",
            "medium risk",
            "yara detections",
            "contacted",
            "related tags",
            "x vercel",
            "file type",
            "type indicator",
            "role title",
            "related pulses",
            "mulch virtua",
            "library loade",
            "included i0",
            "review ioc",
            "excluded ic",
            "suggested",
            "find sugt",
            "samuel tulach",
            "unity engine",
            "tulach",
            "sa awareness",
            "sabey",
            "sar cut",
            "autofill",
            "includer review",
            "portiana oney",
            "targeting",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "musickit_1_.js",
            "lazarus",
            "injection",
            "CVE-2017-8570",
            "prefetch2",
            "target",
            "aaaa",
            "ip address",
            "record value",
            "emails",
            "samuel tuachs",
            "sapev",
            "review exclude",
            "monitored target",
            "script",
            "mitre att",
            "ascii text",
            "span",
            "path",
            "iframe",
            "april",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "body",
            "development att",
            "t1055.012 list planting",
            "active"
          ],
          "references": [
            "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
            "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
            "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
            "https://podcasts.apple.com/us/podcast/lazarus",
            "http://help.aiseesoft.jp/video-converter-ultimate/",
            "http://help.aiseesoft.jp/blu-ray-player",
            "http://help.aiseesoft.jp/fonelab/",
            "https://action.aiseesoft.jp/itunes.php",
            "http://help.aiseesoft.jp/total-video-converter",
            "http://help.aiseesoft.jp/total-video-converter/",
            "http://help.aiseesoft.jp/video-converter-ultimate/",
            "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
            "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
            "http://test-firstmile.digitecgalaxus.ch",
            "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
            "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
            "cdn.rss.applemarketingtools.com",
            "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
            "1.bing.com.cn",
            "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
            "www.phantomcameras.cn",
            "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
            "podcasts.apple.com \u2022 23.34.32.21",
            "www.apple.com \u2022 23.34.32.199",
            "js-cdn.music.apple.com \u2022 23.78.51.170",
            "http://firstmile.digitecgalaxus.ch",
            "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
            "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
            "Tulach.cc",
            "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
            "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
            "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
            "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
            "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
            "asp.net domain pointer",
            "developer.x.com",
            "aotx.alienvault.com (aotx.?)",
            "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
            "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1020.001",
              "name": "Traffic Duplication",
              "display_name": "T1020.001 - Traffic Duplication"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591.002",
              "name": "Business Relationships",
              "display_name": "T1591.002 - Business Relationships"
            },
            {
              "id": "T1591.001",
              "name": "Determine Physical Locations",
              "display_name": "T1591.001 - Determine Physical Locations"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1029,
            "domain": 396,
            "email": 7,
            "URL": 2784,
            "FileHash-SHA256": 898,
            "FileHash-MD5": 79,
            "FileHash-SHA1": 68,
            "IPv4": 35,
            "CVE": 1,
            "SSLCertFingerprint": 13
          },
          "indicator_count": 5310,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "6 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d9b0e549af1aae2975ebeb",
          "name": "Virtual Servers \u2022 Tulach \u2022 Eternal Blue",
          "description": "Interesting. Further  research required. \n\nhttps://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=+New+Worker+Online%0A+PC:+DESKTOP-BBE3PFV%0A+User:+alien%0A+IP:+Sweden%0A+Country:+SE+\n\n\nhttps://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=\\\\xfff0\\\\xff9f\\\\xff9f\\\\xffa2+New+Worker+Online%0A\\\\xfff0\\\\xff9f\\\\xff92\\\\xffbb+PC:+DESKTOP-BBE3PFV%0A\\\\xfff0\\\\xff9f\\\\xff91\\\\xffa4+User:+alien%0A\\\\xfff0\\\\xff9f\\\\xff8c\\\\xff90+IP:+Sweden%0A\\\\xfff0\\\\xff9f\\\\xff97\\\\xffba+Country:+SE+",
          "modified": "2026-04-11T02:24:37.102000",
          "created": "2026-04-11T02:24:37.102000",
          "tags": [
            "related pulses",
            "apple",
            "imac",
            "itunes",
            "tulach",
            "active",
            "vercel",
            "ms windows",
            "intel",
            "yara rule",
            "lredmond",
            "rsds",
            "write c",
            "tls sni",
            "write",
            "install",
            "rijndael",
            "malware",
            "accept",
            "self",
            "mtb apr",
            "lowfi",
            "backdoor",
            "antigua",
            "trojandropper",
            "all ipv4",
            "urls",
            "prometheus",
            "files",
            "files ip",
            "address",
            "united",
            "unknown aaaa",
            "cname",
            "tags",
            "keepalived",
            "ip address",
            "red hat",
            "nat node",
            "gns3",
            "firefox",
            "ovn network",
            "instances",
            "forum",
            "linux",
            "dynamicloader",
            "exclusionpath",
            "medium",
            "high",
            "telegram api",
            "windows",
            "f rl",
            "highest sc",
            "guard",
            "april",
            "powershell",
            "c mar",
            "virtool",
            "c jan",
            "c dec",
            "urls show",
            "url hostname",
            "ransom",
            "click",
            "title",
            "njrat",
            "as64521i",
            "bird",
            "bgp",
            "virtual private",
            "virtual servers",
            "et exploit",
            "ms17010 echo",
            "response",
            "echo response",
            "asnone",
            "probe ms17010",
            "nids",
            "m2 ms17010",
            "regsetvalueexa",
            "service",
            "wannacry",
            "dock",
            "unknown",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "found",
            "mitre att",
            "defense evasion",
            "sha1",
            "sha256",
            "size",
            "pattern match",
            "ascii text",
            "path",
            "stop",
            "hybrid",
            "general",
            "local",
            "twitter",
            "strings",
            "core",
            "telegram",
            "tools"
          ],
          "references": [
            "Win.Ransomware.WannaCry-6313787-0 ,  Ransom:Win32/WannaCrypt.H IDS Detections Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE Probe MS17-010 (Generic Flags) Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  WannaCry_Ransomware_Gen ,  WannaDecryptor ,  stack_string ,  MS17_010_WanaCry_worm More Alerts nids_exploit",
            "https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=+New+Worker+Online%0A+PC:+DESKTOP-BBE3PFV%0A+User:+alien%0A+IP:+Sweden%0A+Country:+SE+ Akamai rank: #2475\t  URL https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=\\\\xfff0\\\\xff9f\\\\xff9f\\\\xffa2+New+Worker+Online%0A\\\\xfff0\\\\xff9f\\\\xff92\\\\xffbb+PC:+DESKTOP-BBE3PFV%0A\\\\xfff0\\\\xff9f\\\\xff91\\\\xffa4+User:+alien%0A\\\\xfff0\\\\xff9f\\\\xff8c\\\\xff9",
            "https://go.recordedfuture.com/hubfs/reports/cta-2023-0816.pdf",
            "https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f",
            "Trojans: 149.154.166.110 command_and_control (build your own telegram)  208.95.112.1 command_and_control",
            "prometheus.shorty.cicloinfinito.com",
            "Win.Packed.njRAT-10002074-1",
            "NJRat IDS Detections: Telegram API Domain in DNS Lookup",
            "NJRat IDS Detections: Observed Telegram API Domain (api .telegram .org in TLS SNI)",
            "NJRat IDS Detections: Telegram API Certificate Observed",
            "NJRat Yara Detections: ByteCode_MSIL_Backdoor_AsyncRAT",
            "NJRat Alerts: hardware_id_profiling network_cnc_https_pastesite persistence_autorun",
            "NJRat Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert",
            "NJRat Alerts: windows_defender_powershell network_document_file powershell_command_suspicious",
            "NJRat Alerts: suspicious_command_tools antidebug_guardpages antisandbox_sleep",
            "NJRat Alerts: dynamic_function_loading encrypted_ioc registers_vectored_exception_handler",
            "NJRat Alerts: http_request reads_memory_remote_process network_cnc_https_generic reads_self",
            "NJRat IP\u2019s Contacted  149.154.166.110  172.66.171.73",
            "NJRat Domains Contacted pastebin.com api.telegram.org",
            "192.168.122.200 BGP: Simulating Inter-network Dynamic Routing",
            "EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.105\",         \"dst_port\": 49317,         \"sid\": 2025650,         \"date\": \"2020/06/18 11:39:48\",         \"dst_ip\": \"192.168.56.103\"       },       \"type\": \"ioc\",       \"description\": null     },     {       \"category\": \"suricata\",       \"ioc\": {         \"src_port\": 445,         \"name\": \"ET EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.108\",         \"dst_port\": 49324,  "
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Japan",
            "United States of America",
            "China"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Generic-9908396-0",
              "display_name": "Win.Trojan.Generic-9908396-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Crypted-30",
              "display_name": "Win.Trojan.Crypted-30",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Berbew",
              "display_name": "Backdoor:Win32/Berbew",
              "target": "/malware/Backdoor:Win32/Berbew"
            },
            {
              "id": "Win.Malware.Score-6985947-1",
              "display_name": "Win.Malware.Score-6985947-1",
              "target": null
            },
            {
              "id": "ALF:PWS:MSIL/Stealgen.GC!MTB",
              "display_name": "ALF:PWS:MSIL/Stealgen.GC!MTB",
              "target": null
            },
            {
              "id": "Win.Packed.Zpack-10013367-0",
              "display_name": "Win.Packed.Zpack-10013367-0",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook.F!MTB",
              "display_name": "ALF:Trojan:Win32/FormBook.F!MTB",
              "target": null
            },
            {
              "id": "Win.Malware.Renos-10003934-0",
              "display_name": "Win.Malware.Renos-10003934-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Razy-10016933-0",
              "display_name": "Win.Trojan.Razy-10016933-0",
              "target": null
            },
            {
              "id": "#Lowfi:AGGR:HSTR:Win32/PossibleKeylogger.A",
              "display_name": "#Lowfi:AGGR:HSTR:Win32/PossibleKeylogger.A",
              "target": null
            },
            {
              "id": "NJRat",
              "display_name": "NJRat",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Private Internet Access",
              "display_name": "Private Internet Access",
              "target": null
            },
            {
              "id": "Malware Packed",
              "display_name": "Malware Packed",
              "target": null
            },
            {
              "id": "W32/WannaCryptor.491A!tr.ransom",
              "display_name": "W32/WannaCryptor.491A!tr.ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1584.003",
              "name": "Virtual Private Server",
              "display_name": "T1584.003 - Virtual Private Server"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1144",
              "name": "Gatekeeper Bypass",
              "display_name": "T1144 - Gatekeeper Bypass"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            }
          ],
          "industries": [
            "Telecommunications",
            "Education"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 556,
            "domain": 206,
            "URL": 863,
            "FileHash-SHA256": 1589,
            "IPv4": 519,
            "FileHash-MD5": 472,
            "FileHash-SHA1": 376,
            "SSLCertFingerprint": 11,
            "email": 1
          },
          "indicator_count": 4593,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "9 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "699c6ef61298b57cd7275728",
          "name": "Apple Support IOC\u2019s IcedID | Bloored |  Mydoom worm | iOS IOC\u2019s",
          "description": "A list of Apple and Apple related iOS\u2019s linked to a malicious redirect found in an apple.support.com redirect. Two separate Apple ID\u2019s on one iPhone. | Mimecast compromised with Emotet. iCloud siphoning. Related to Pulse  found in references. |  IOC\u2019s came from a single url.",
          "modified": "2026-03-25T07:05:10.628000",
          "created": "2026-02-23T15:15:02.857000",
          "tags": [
            "ipv4",
            "http",
            "passive dns",
            "files domain",
            "united",
            "unknown ns",
            "for privacy",
            "ip address",
            "domain",
            "dynamicloader",
            "antivirus",
            "yara rule",
            "fe ff",
            "write c",
            "msvisualcpp60",
            "rsds",
            "e8 c8",
            "e8 a8",
            "ff e1",
            "unknown",
            "worm",
            "launch",
            "write",
            "explorer",
            "february",
            "push",
            "service",
            "files",
            "reverse dns",
            "america flag",
            "america asn",
            "url add",
            "otx logo",
            "all ipv4",
            "searc",
            "date checked",
            "server response",
            "results dec",
            "unknown soa",
            "present aug",
            "present oct",
            "present sep",
            "present nov",
            "moved",
            "error",
            "title",
            "win32mydoom feb",
            "aaaa",
            "name servers",
            "trojan",
            "servers",
            "virtool",
            "united states",
            "apple",
            "crlf line",
            "unicode text",
            "utf8",
            "ff d5",
            "ascii text",
            "ee fc",
            "suspicious",
            "music",
            "malware",
            "role title",
            "ttl value",
            ".cc",
            "d4 f5",
            "msvisualcpp2002",
            "msvisualcpp2005",
            "apple support",
            ".ch",
            "privaterelay",
            "pattern match",
            "ck id",
            "mitre att",
            "ck matrix",
            "href",
            "et info",
            "general",
            "local",
            "path",
            "click",
            "learn",
            "command",
            "name tactics",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "present jun",
            "backdoor",
            "present may",
            "status",
            "ransom",
            "high",
            "medium",
            "windows",
            "tofsee",
            "loaderid",
            "lidfileupd",
            "localcfg",
            "rndhex",
            "stream",
            "delete",
            "emotet",
            "bot network",
            "mitm",
            "screenshot",
            "mimecast"
          ],
          "references": [
            "http://apple.support.com/ht***** redirect",
            "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
            "mac.store",
            "https://icloud.ch/cn/ipod-touch/",
            "https://icloud.ch/",
            "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
            "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
            "Redirect: schemas.microsoft.com",
            "apple.com(-inc.cc)",
            "oas-japac-domains-applecomputer.cn",
            "robert-aebi.appleid.com",
            "smtp2.icl-privaterelay.appleid.com",
            "http://audaxgroup.appleid.com/",
            "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
            "iphonegermany.com",
            "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
            "https://aspmx.l.google.com/",
            "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
            "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
            "http://www.icloud-sms-alert.com/",
            "monitoring.eurovision.net",
            "https://www.irby.com/iub-en/services/testing-and-monitoring",
            "monitor.kyos.ninja"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/IcedId.DI!MTB",
              "display_name": "Trojan:Win32/IcedId.DI!MTB",
              "target": "/malware/Trojan:Win32/IcedId.DI!MTB"
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored",
              "display_name": "Worm:Win32/Bloored",
              "target": "/malware/Worm:Win32/Bloored"
            },
            {
              "id": "Win.Malware.Elenooka-6996044-0",
              "display_name": "Win.Malware.Elenooka-6996044-0",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6031,
            "hostname": 1971,
            "domain": 1125,
            "FileHash-SHA256": 1715,
            "email": 18,
            "FileHash-MD5": 317,
            "FileHash-SHA1": 164
          },
          "indicator_count": 11341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "26 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://icloud.ch/cn/ipod-touch/",
        "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
        "NJRat IDS Detections: Telegram API Domain in DNS Lookup",
        "asp.net domain pointer",
        "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
        "cdn.rss.applemarketingtools.com",
        "aotx.alienvault.com (aotx.?)",
        "https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=+New+Worker+Online%0A+PC:+DESKTOP-BBE3PFV%0A+User:+alien%0A+IP:+Sweden%0A+Country:+SE+ Akamai rank: #2475\t  URL https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=\\\\xfff0\\\\xff9f\\\\xff9f\\\\xffa2+New+Worker+Online%0A\\\\xfff0\\\\xff9f\\\\xff92\\\\xffbb+PC:+DESKTOP-BBE3PFV%0A\\\\xfff0\\\\xff9f\\\\xff91\\\\xffa4+User:+alien%0A\\\\xfff0\\\\xff9f\\\\xff8c\\\\xff9",
        "smtp2.icl-privaterelay.appleid.com",
        "http://firstmile.digitecgalaxus.ch",
        "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
        "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
        "monitor.kyos.ninja",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
        "NJRat IP\u2019s Contacted  149.154.166.110  172.66.171.73",
        "Win.Packed.njRAT-10002074-1",
        "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
        "NJRat Yara Detections: ByteCode_MSIL_Backdoor_AsyncRAT",
        "https://aspmx.l.google.com/",
        "https://go.recordedfuture.com/hubfs/reports/cta-2023-0816.pdf",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
        "monitoring.eurovision.net",
        "NJRat Alerts: hardware_id_profiling network_cnc_https_pastesite persistence_autorun",
        "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
        "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
        "https://action.aiseesoft.jp/itunes.php",
        "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
        "Win.Ransomware.WannaCry-6313787-0 ,  Ransom:Win32/WannaCrypt.H IDS Detections Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE Probe MS17-010 (Generic Flags) Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  WannaCry_Ransomware_Gen ,  WannaDecryptor ,  stack_string ,  MS17_010_WanaCry_worm More Alerts nids_exploit",
        "mac.store",
        "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "https://podcasts.apple.com/us/podcast/lazarus",
        "NJRat Alerts: suspicious_command_tools antidebug_guardpages antisandbox_sleep",
        "www.phantomcameras.cn",
        "NJRat IDS Detections: Telegram API Certificate Observed",
        "http://test-firstmile.digitecgalaxus.ch",
        "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
        "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
        "apple.com(-inc.cc)",
        "http://help.aiseesoft.jp/total-video-converter",
        "prometheus.shorty.cicloinfinito.com",
        "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
        "NJRat IDS Detections: Observed Telegram API Domain (api .telegram .org in TLS SNI)",
        "https://icloud.ch/",
        "www.apple.com \u2022 23.34.32.199",
        "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
        "NJRat Alerts: windows_defender_powershell network_document_file powershell_command_suspicious",
        "https://www.irby.com/iub-en/services/testing-and-monitoring",
        "192.168.122.200 BGP: Simulating Inter-network Dynamic Routing",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "NJRat Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert",
        "podcasts.apple.com \u2022 23.34.32.21",
        "robert-aebi.appleid.com",
        "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
        "developer.x.com",
        "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
        "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
        "iphonegermany.com",
        "1.bing.com.cn",
        "oas-japac-domains-applecomputer.cn",
        "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
        "http://help.aiseesoft.jp/fonelab/",
        "http://help.aiseesoft.jp/blu-ray-player",
        "http://www.icloud-sms-alert.com/",
        "js-cdn.music.apple.com \u2022 23.78.51.170",
        "NJRat Domains Contacted pastebin.com api.telegram.org",
        "http://help.aiseesoft.jp/total-video-converter/",
        "http://apple.support.com/ht***** redirect",
        "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
        "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
        "NJRat Alerts: dynamic_function_loading encrypted_ioc registers_vectored_exception_handler",
        "EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.105\",         \"dst_port\": 49317,         \"sid\": 2025650,         \"date\": \"2020/06/18 11:39:48\",         \"dst_ip\": \"192.168.56.103\"       },       \"type\": \"ioc\",       \"description\": null     },     {       \"category\": \"suricata\",       \"ioc\": {         \"src_port\": 445,         \"name\": \"ET EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.108\",         \"dst_port\": 49324,  ",
        "Tulach.cc",
        "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
        "NJRat Alerts: http_request reads_memory_remote_process network_cnc_https_generic reads_self",
        "Trojans: 149.154.166.110 command_and_control (build your own telegram)  208.95.112.1 command_and_control",
        "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f",
        "http://audaxgroup.appleid.com/",
        "https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f",
        "Redirect: schemas.microsoft.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.trojan.generic-9908396-0",
            "#lowfi:aggr:hstr:win32/possiblekeylogger.a",
            "Alf:pws:msil/stealgen.gc!mtb",
            "Win.packed.zpack-10013367-0",
            "Alf:trojan:win32/formbook.f!mtb",
            "Njrat",
            "Nids",
            "Win.trojan.razy-10016933-0",
            "Trojan:win32/icedid.di!mtb",
            "Emotet",
            "Private internet access",
            "Mydoom",
            "Win.malware.elenooka-6996044-0",
            "Win.malware.score-6985947-1",
            "Win.malware.renos-10003934-0",
            "Worm:win32/bloored",
            "Win.trojan.crypted-30",
            "W32/wannacryptor.491a!tr.ransom",
            "Malware packed",
            "Backdoor:win32/berbew",
            "Et"
          ],
          "industries": [
            "Education",
            "Telecommunications"
          ],
          "unique_indicators": 20607
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/itunes.gr",
    "whois": "http://whois.domaintools.com/itunes.gr",
    "domain": "itunes.gr",
    "hostname": "webssofed.itunes.gr"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "69ddeb45c45f6a3cd721397d",
      "name": "Active attacks  \u2022 Apple \u2022 Tulach",
      "description": "Including 360+ Apple\nIoC\u2019s from Malicious Tulac.cc + Virtual Servers Pulses. Ongoing history of malicious attacks, custom malware engineer, malicious media , account control. \n\nI was blocked from VirusToltal. It was Tulach Nextcloud posse. What I am doing now s legal. \n\nReferenced below. URL: \"https://accountapple.com/\" contacted related malicious domain: \"accountapple.com\"\nCONTACTED DOMAIN: \"sqllq.com\" has been identified as malicious",
      "modified": "2026-04-14T07:22:45.250000",
      "created": "2026-04-14T07:22:45.250000",
      "tags": [
        "url http",
        "ipv4",
        "indicator role",
        "active related",
        "united",
        "moved",
        "gmt content",
        "certificate",
        "all domain",
        "msie",
        "chrome",
        "extraction",
        "data upload",
        "twitter",
        "cookie",
        "extra",
        "include data",
        "review locs",
        "exclude",
        "suggested os",
        "onlv",
        "failed",
        "stop data",
        "read c",
        "unicode",
        "rgba",
        "memcommit",
        "delete",
        "dock",
        "write",
        "execution",
        "sc type",
        "extri",
        "include review",
        "exclude sugges",
        "typ data",
        "a domains",
        "present apr",
        "script urls",
        "files",
        "files ip",
        "address",
        "ios",
        "mac",
        "apple",
        "appleid",
        "itunes",
        "next associated",
        "all ipv4",
        "included ic",
        "uny teade",
        "type hostnar",
        "hostnar hostnar",
        "hostnar",
        "macair",
        "macairaustralia",
        "ipad",
        "ipod",
        "cryptexportkey",
        "invalid pointer",
        "cryptgenkey",
        "stream",
        "defender",
        "delphi",
        "class",
        "stack",
        "format",
        "unknown",
        "united states",
        "phishing",
        "password",
        "traffic redirected",
        "service mod",
        "service execution",
        "youtube",
        "music",
        "streams",
        "songs",
        "played songs",
        "music streams",
        "most played",
        "fonelab",
        "indicator",
        "included iocs",
        "manually add",
        "review ocs",
        "exclude inn",
        "sugges data",
        "find",
        "include",
        "url https",
        "enter sc",
        "type",
        "no matchme",
        "search otx",
        "https",
        "references x",
        "analyze",
        "open th",
        "url data",
        "se http",
        "no match",
        "excluded iocs",
        "iocs",
        "ip whitelisted",
        "whitelisted",
        "tcp include",
        "analysis date",
        "file score",
        "medium risk",
        "yara detections",
        "contacted",
        "related tags",
        "x vercel",
        "file type",
        "type indicator",
        "role title",
        "related pulses",
        "mulch virtua",
        "library loade",
        "included i0",
        "review ioc",
        "excluded ic",
        "suggested",
        "find sugt",
        "samuel tulach",
        "unity engine",
        "tulach",
        "sa awareness",
        "sabey",
        "sar cut",
        "autofill",
        "includer review",
        "portiana oney",
        "targeting",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "musickit_1_.js",
        "lazarus",
        "injection",
        "CVE-2017-8570",
        "prefetch2",
        "target",
        "aaaa",
        "ip address",
        "record value",
        "emails",
        "samuel tuachs",
        "sapev",
        "review exclude",
        "monitored target",
        "script",
        "mitre att",
        "ascii text",
        "span",
        "path",
        "iframe",
        "april",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "body",
        "development att",
        "t1055.012 list planting",
        "active"
      ],
      "references": [
        "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
        "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
        "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
        "https://podcasts.apple.com/us/podcast/lazarus",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "http://help.aiseesoft.jp/blu-ray-player",
        "http://help.aiseesoft.jp/fonelab/",
        "https://action.aiseesoft.jp/itunes.php",
        "http://help.aiseesoft.jp/total-video-converter",
        "http://help.aiseesoft.jp/total-video-converter/",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
        "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
        "http://test-firstmile.digitecgalaxus.ch",
        "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
        "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
        "cdn.rss.applemarketingtools.com",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "1.bing.com.cn",
        "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
        "www.phantomcameras.cn",
        "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
        "podcasts.apple.com \u2022 23.34.32.21",
        "www.apple.com \u2022 23.34.32.199",
        "js-cdn.music.apple.com \u2022 23.78.51.170",
        "http://firstmile.digitecgalaxus.ch",
        "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
        "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
        "Tulach.cc",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
        "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
        "asp.net domain pointer",
        "developer.x.com",
        "aotx.alienvault.com (aotx.?)",
        "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
        "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1020.001",
          "name": "Traffic Duplication",
          "display_name": "T1020.001 - Traffic Duplication"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591.002",
          "name": "Business Relationships",
          "display_name": "T1591.002 - Business Relationships"
        },
        {
          "id": "T1591.001",
          "name": "Determine Physical Locations",
          "display_name": "T1591.001 - Determine Physical Locations"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1029,
        "domain": 396,
        "email": 7,
        "URL": 2784,
        "FileHash-SHA256": 898,
        "FileHash-MD5": 79,
        "FileHash-SHA1": 68,
        "IPv4": 35,
        "CVE": 1,
        "SSLCertFingerprint": 13
      },
      "indicator_count": 5310,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "6 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d9b0e549af1aae2975ebeb",
      "name": "Virtual Servers \u2022 Tulach \u2022 Eternal Blue",
      "description": "Interesting. Further  research required. \n\nhttps://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=+New+Worker+Online%0A+PC:+DESKTOP-BBE3PFV%0A+User:+alien%0A+IP:+Sweden%0A+Country:+SE+\n\n\nhttps://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=\\\\xfff0\\\\xff9f\\\\xff9f\\\\xffa2+New+Worker+Online%0A\\\\xfff0\\\\xff9f\\\\xff92\\\\xffbb+PC:+DESKTOP-BBE3PFV%0A\\\\xfff0\\\\xff9f\\\\xff91\\\\xffa4+User:+alien%0A\\\\xfff0\\\\xff9f\\\\xff8c\\\\xff90+IP:+Sweden%0A\\\\xfff0\\\\xff9f\\\\xff97\\\\xffba+Country:+SE+",
      "modified": "2026-04-11T02:24:37.102000",
      "created": "2026-04-11T02:24:37.102000",
      "tags": [
        "related pulses",
        "apple",
        "imac",
        "itunes",
        "tulach",
        "active",
        "vercel",
        "ms windows",
        "intel",
        "yara rule",
        "lredmond",
        "rsds",
        "write c",
        "tls sni",
        "write",
        "install",
        "rijndael",
        "malware",
        "accept",
        "self",
        "mtb apr",
        "lowfi",
        "backdoor",
        "antigua",
        "trojandropper",
        "all ipv4",
        "urls",
        "prometheus",
        "files",
        "files ip",
        "address",
        "united",
        "unknown aaaa",
        "cname",
        "tags",
        "keepalived",
        "ip address",
        "red hat",
        "nat node",
        "gns3",
        "firefox",
        "ovn network",
        "instances",
        "forum",
        "linux",
        "dynamicloader",
        "exclusionpath",
        "medium",
        "high",
        "telegram api",
        "windows",
        "f rl",
        "highest sc",
        "guard",
        "april",
        "powershell",
        "c mar",
        "virtool",
        "c jan",
        "c dec",
        "urls show",
        "url hostname",
        "ransom",
        "click",
        "title",
        "njrat",
        "as64521i",
        "bird",
        "bgp",
        "virtual private",
        "virtual servers",
        "et exploit",
        "ms17010 echo",
        "response",
        "echo response",
        "asnone",
        "probe ms17010",
        "nids",
        "m2 ms17010",
        "regsetvalueexa",
        "service",
        "wannacry",
        "dock",
        "unknown",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "found",
        "mitre att",
        "defense evasion",
        "sha1",
        "sha256",
        "size",
        "pattern match",
        "ascii text",
        "path",
        "stop",
        "hybrid",
        "general",
        "local",
        "twitter",
        "strings",
        "core",
        "telegram",
        "tools"
      ],
      "references": [
        "Win.Ransomware.WannaCry-6313787-0 ,  Ransom:Win32/WannaCrypt.H IDS Detections Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE Probe MS17-010 (Generic Flags) Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  WannaCry_Ransomware_Gen ,  WannaDecryptor ,  stack_string ,  MS17_010_WanaCry_worm More Alerts nids_exploit",
        "https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=+New+Worker+Online%0A+PC:+DESKTOP-BBE3PFV%0A+User:+alien%0A+IP:+Sweden%0A+Country:+SE+ Akamai rank: #2475\t  URL https://api.telegram.org/bot8479694307:AAHBqcVtSCKfb3XApVQcVGpW7SFQgnxZJgM/sendMessage?chat_id=-1002760967718&text=\\\\xfff0\\\\xff9f\\\\xff9f\\\\xffa2+New+Worker+Online%0A\\\\xfff0\\\\xff9f\\\\xff92\\\\xffbb+PC:+DESKTOP-BBE3PFV%0A\\\\xfff0\\\\xff9f\\\\xff91\\\\xffa4+User:+alien%0A\\\\xfff0\\\\xff9f\\\\xff8c\\\\xff9",
        "https://go.recordedfuture.com/hubfs/reports/cta-2023-0816.pdf",
        "https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f",
        "Trojans: 149.154.166.110 command_and_control (build your own telegram)  208.95.112.1 command_and_control",
        "prometheus.shorty.cicloinfinito.com",
        "Win.Packed.njRAT-10002074-1",
        "NJRat IDS Detections: Telegram API Domain in DNS Lookup",
        "NJRat IDS Detections: Observed Telegram API Domain (api .telegram .org in TLS SNI)",
        "NJRat IDS Detections: Telegram API Certificate Observed",
        "NJRat Yara Detections: ByteCode_MSIL_Backdoor_AsyncRAT",
        "NJRat Alerts: hardware_id_profiling network_cnc_https_pastesite persistence_autorun",
        "NJRat Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert",
        "NJRat Alerts: windows_defender_powershell network_document_file powershell_command_suspicious",
        "NJRat Alerts: suspicious_command_tools antidebug_guardpages antisandbox_sleep",
        "NJRat Alerts: dynamic_function_loading encrypted_ioc registers_vectored_exception_handler",
        "NJRat Alerts: http_request reads_memory_remote_process network_cnc_https_generic reads_self",
        "NJRat IP\u2019s Contacted  149.154.166.110  172.66.171.73",
        "NJRat Domains Contacted pastebin.com api.telegram.org",
        "192.168.122.200 BGP: Simulating Inter-network Dynamic Routing",
        "EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.105\",         \"dst_port\": 49317,         \"sid\": 2025650,         \"date\": \"2020/06/18 11:39:48\",         \"dst_ip\": \"192.168.56.103\"       },       \"type\": \"ioc\",       \"description\": null     },     {       \"category\": \"suricata\",       \"ioc\": {         \"src_port\": 445,         \"name\": \"ET EXPLOIT ETERNALBLUE Probe Vulnerable System Response MS17-010\",         \"src_ip\": \"192.168.56.108\",         \"dst_port\": 49324,  "
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Japan",
        "United States of America",
        "China"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Generic-9908396-0",
          "display_name": "Win.Trojan.Generic-9908396-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Crypted-30",
          "display_name": "Win.Trojan.Crypted-30",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Berbew",
          "display_name": "Backdoor:Win32/Berbew",
          "target": "/malware/Backdoor:Win32/Berbew"
        },
        {
          "id": "Win.Malware.Score-6985947-1",
          "display_name": "Win.Malware.Score-6985947-1",
          "target": null
        },
        {
          "id": "ALF:PWS:MSIL/Stealgen.GC!MTB",
          "display_name": "ALF:PWS:MSIL/Stealgen.GC!MTB",
          "target": null
        },
        {
          "id": "Win.Packed.Zpack-10013367-0",
          "display_name": "Win.Packed.Zpack-10013367-0",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook.F!MTB",
          "display_name": "ALF:Trojan:Win32/FormBook.F!MTB",
          "target": null
        },
        {
          "id": "Win.Malware.Renos-10003934-0",
          "display_name": "Win.Malware.Renos-10003934-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Razy-10016933-0",
          "display_name": "Win.Trojan.Razy-10016933-0",
          "target": null
        },
        {
          "id": "#Lowfi:AGGR:HSTR:Win32/PossibleKeylogger.A",
          "display_name": "#Lowfi:AGGR:HSTR:Win32/PossibleKeylogger.A",
          "target": null
        },
        {
          "id": "NJRat",
          "display_name": "NJRat",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Private Internet Access",
          "display_name": "Private Internet Access",
          "target": null
        },
        {
          "id": "Malware Packed",
          "display_name": "Malware Packed",
          "target": null
        },
        {
          "id": "W32/WannaCryptor.491A!tr.ransom",
          "display_name": "W32/WannaCryptor.491A!tr.ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1584.003",
          "name": "Virtual Private Server",
          "display_name": "T1584.003 - Virtual Private Server"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1144",
          "name": "Gatekeeper Bypass",
          "display_name": "T1144 - Gatekeeper Bypass"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        }
      ],
      "industries": [
        "Telecommunications",
        "Education"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 556,
        "domain": 206,
        "URL": 863,
        "FileHash-SHA256": 1589,
        "IPv4": 519,
        "FileHash-MD5": 472,
        "FileHash-SHA1": 376,
        "SSLCertFingerprint": 11,
        "email": 1
      },
      "indicator_count": 4593,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "9 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "699c6ef61298b57cd7275728",
      "name": "Apple Support IOC\u2019s IcedID | Bloored |  Mydoom worm | iOS IOC\u2019s",
      "description": "A list of Apple and Apple related iOS\u2019s linked to a malicious redirect found in an apple.support.com redirect. Two separate Apple ID\u2019s on one iPhone. | Mimecast compromised with Emotet. iCloud siphoning. Related to Pulse  found in references. |  IOC\u2019s came from a single url.",
      "modified": "2026-03-25T07:05:10.628000",
      "created": "2026-02-23T15:15:02.857000",
      "tags": [
        "ipv4",
        "http",
        "passive dns",
        "files domain",
        "united",
        "unknown ns",
        "for privacy",
        "ip address",
        "domain",
        "dynamicloader",
        "antivirus",
        "yara rule",
        "fe ff",
        "write c",
        "msvisualcpp60",
        "rsds",
        "e8 c8",
        "e8 a8",
        "ff e1",
        "unknown",
        "worm",
        "launch",
        "write",
        "explorer",
        "february",
        "push",
        "service",
        "files",
        "reverse dns",
        "america flag",
        "america asn",
        "url add",
        "otx logo",
        "all ipv4",
        "searc",
        "date checked",
        "server response",
        "results dec",
        "unknown soa",
        "present aug",
        "present oct",
        "present sep",
        "present nov",
        "moved",
        "error",
        "title",
        "win32mydoom feb",
        "aaaa",
        "name servers",
        "trojan",
        "servers",
        "virtool",
        "united states",
        "apple",
        "crlf line",
        "unicode text",
        "utf8",
        "ff d5",
        "ascii text",
        "ee fc",
        "suspicious",
        "music",
        "malware",
        "role title",
        "ttl value",
        ".cc",
        "d4 f5",
        "msvisualcpp2002",
        "msvisualcpp2005",
        "apple support",
        ".ch",
        "privaterelay",
        "pattern match",
        "ck id",
        "mitre att",
        "ck matrix",
        "href",
        "et info",
        "general",
        "local",
        "path",
        "click",
        "learn",
        "command",
        "name tactics",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "present jun",
        "backdoor",
        "present may",
        "status",
        "ransom",
        "high",
        "medium",
        "windows",
        "tofsee",
        "loaderid",
        "lidfileupd",
        "localcfg",
        "rndhex",
        "stream",
        "delete",
        "emotet",
        "bot network",
        "mitm",
        "screenshot",
        "mimecast"
      ],
      "references": [
        "http://apple.support.com/ht***** redirect",
        "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
        "mac.store",
        "https://icloud.ch/cn/ipod-touch/",
        "https://icloud.ch/",
        "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
        "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
        "Redirect: schemas.microsoft.com",
        "apple.com(-inc.cc)",
        "oas-japac-domains-applecomputer.cn",
        "robert-aebi.appleid.com",
        "smtp2.icl-privaterelay.appleid.com",
        "http://audaxgroup.appleid.com/",
        "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
        "iphonegermany.com",
        "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
        "https://aspmx.l.google.com/",
        "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
        "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
        "http://www.icloud-sms-alert.com/",
        "monitoring.eurovision.net",
        "https://www.irby.com/iub-en/services/testing-and-monitoring",
        "monitor.kyos.ninja"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/IcedId.DI!MTB",
          "display_name": "Trojan:Win32/IcedId.DI!MTB",
          "target": "/malware/Trojan:Win32/IcedId.DI!MTB"
        },
        {
          "id": "MyDoom",
          "display_name": "MyDoom",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored",
          "display_name": "Worm:Win32/Bloored",
          "target": "/malware/Worm:Win32/Bloored"
        },
        {
          "id": "Win.Malware.Elenooka-6996044-0",
          "display_name": "Win.Malware.Elenooka-6996044-0",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6031,
        "hostname": 1971,
        "domain": 1125,
        "FileHash-SHA256": 1715,
        "email": 18,
        "FileHash-MD5": 317,
        "FileHash-SHA1": 164
      },
      "indicator_count": 11341,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "26 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://webssofed.itunes.gr/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://webssofed.itunes.gr/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776701417.3380864
}