{
  "type": "URL",
  "indicator": "https://ww12.sos-file.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ww12.sos-file.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4135002778,
      "indicator": "https://ww12.sos-file.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "6910cafb096eae0dcb39a800",
          "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
          "description": "Chronicles of how  quasi government , a State owned criminal defense attorney , protects sexual assaulter Jeffrey Reimer DPT.   victim Palantir harassed, withheld healthcare , diagnoses, justice, monetary award for injured, stole insurance policies, hacked Denver artists, sold music her to artists whom profited, hacked  Denver music studios, hired stalkers, human, controlled phone , car and everything in targets life including , doctors, attorneys, hospitals. It\u2019s always been clear to coming us that Anonymous and Lazarus are the police, judge , lawyer, ransom racist.\nThis group alone has cost the US billions! Responsible for 2014 Sony hack , FMOE.\nDirect Link. by phone , email in person contact , forced settlement hearing,. Adversarial Christopher P. Ahmann , relationship w / Lazarus group, hitmen , cyber crime and other crimes against persons.\n #rip #christopher_ahmann #palantir #lazarus #target_tsara_brashears",
          "modified": "2025-12-09T17:03:48.645000",
          "created": "2025-11-09T17:10:19.498000",
          "tags": [
            "url http",
            "apple",
            "california",
            "apple public",
            "server rsa",
            "organization",
            "stateprovince",
            "ocsp",
            "nids united",
            "files",
            "united",
            "unknown ns",
            "ip address",
            "domain",
            "urls files",
            "passive dns",
            "found title",
            "sf hello",
            "myriad set",
            "pro myriad",
            "set lucida",
            "grande arial",
            "sf mono",
            "ipv4",
            "location united",
            "america flag",
            "america asn",
            "verdict",
            "files ip",
            "address",
            "as42 woodynet",
            "domain add",
            "ipv4 add",
            "reverse dns",
            "trojan",
            "name servers",
            "emails",
            "for privacy",
            "ltd dba",
            "com laude",
            "servers",
            "expiration date",
            "urls",
            "meta",
            "a domains",
            "country code",
            "store home",
            "title",
            "accept",
            "espaol",
            "english",
            "evil corp",
            "see all",
            "cyber hack",
            "republic",
            "canada",
            "season",
            "joe tidy",
            "sarah rainsford",
            "podcast",
            "bank",
            "ukraine",
            "dead",
            "indonesia",
            "police",
            "premium",
            "napoleon",
            "revolution",
            "michelangelo",
            "mozart",
            "global",
            "solid",
            "lazarus",
            "jabber zeus",
            "harrods",
            "ta markmonitor",
            "markmonitor",
            "search",
            "present aug",
            "unknown aaaa",
            "unknown soa",
            "win32",
            "invalid url",
            "trojanspy",
            "mtb apr",
            "backdoor",
            "next associated",
            "win64",
            "trojandropper",
            "twitter",
            "virtool",
            "ransom",
            "worm",
            "dynamicloader",
            "tlsv1",
            "high",
            "globalc",
            "medium",
            "windows",
            "cmd c",
            "delete c",
            "stream",
            "write",
            "next",
            "process32nextw",
            "http host",
            "dns query",
            "likely gandcrab",
            "et trojan",
            "windows nt",
            "wow64",
            "malware",
            "ms windows",
            "as16509",
            "as54113",
            "yara rule",
            "pe32 executable",
            "as15169",
            "powershell",
            "unknown",
            "response ip",
            "address google",
            "safe browsing",
            "hostname add",
            "port",
            "destination",
            "pe32",
            "intel",
            "error",
            "show",
            "delphi",
            "dcom",
            "form",
            "canvas",
            "united kingdom",
            "content type",
            "security",
            "moved",
            "great britain",
            "unknown a",
            "body doctype",
            "html public",
            "ietfdtd html",
            "showing",
            "packing t1045",
            "bytes",
            "read",
            "default",
            "christoper p ahmann",
            "target",
            "victims",
            "tsara brashears",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "present nov",
            "present oct",
            "date",
            "tcpmemhit",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "palantir",
            "foundry",
            "hitmen",
            "quasi",
            "government contracts",
            "jeffrey reimer",
            "hallrender",
            "workers compensation",
            "record value",
            "certificate"
          ],
          "references": [
            "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
            "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "bpc-old.palantirfoundry.com",
            "OTX auto populated  targeted groups.",
            "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
            "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
            "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
            "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
            "They blatantly steal from citizens , blame foreign entities.",
            "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
          ],
          "public": 1,
          "adversary": "Lazarus",
          "targeted_countries": [
            "Bangladesh",
            "Japan",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:SpikeAexR.PEVPSZL",
              "display_name": "ALF:SpikeAexR.PEVPSZL",
              "target": null
            },
            {
              "id": "Ransom:MSIL/GandCrab",
              "display_name": "Ransom:MSIL/GandCrab",
              "target": "/malware/Ransom:MSIL/GandCrab"
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "Ransom:Win32/Gandcrab.H!MTB",
              "display_name": "Ransom:Win32/Gandcrab.H!MTB",
              "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [
            "Banks",
            "Crypto",
            "Entertainment",
            "Bank"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4572,
            "FileHash-MD5": 196,
            "domain": 1523,
            "hostname": 1393,
            "FileHash-SHA256": 2400,
            "FileHash-SHA1": 175,
            "email": 18,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 10285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "131 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69138a8144a8bf8040a92711",
          "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Counsel for egregious criminal acts \u2022 Christopher P. Ahmann attorney at Large",
          "description": "",
          "modified": "2025-12-09T17:03:48.645000",
          "created": "2025-11-11T19:12:01.843000",
          "tags": [
            "url http",
            "apple",
            "california",
            "apple public",
            "server rsa",
            "organization",
            "stateprovince",
            "ocsp",
            "nids united",
            "files",
            "united",
            "unknown ns",
            "ip address",
            "domain",
            "urls files",
            "passive dns",
            "found title",
            "sf hello",
            "myriad set",
            "pro myriad",
            "set lucida",
            "grande arial",
            "sf mono",
            "ipv4",
            "location united",
            "america flag",
            "america asn",
            "verdict",
            "files ip",
            "address",
            "as42 woodynet",
            "domain add",
            "ipv4 add",
            "reverse dns",
            "trojan",
            "name servers",
            "emails",
            "for privacy",
            "ltd dba",
            "com laude",
            "servers",
            "expiration date",
            "urls",
            "meta",
            "a domains",
            "country code",
            "store home",
            "title",
            "accept",
            "espaol",
            "english",
            "evil corp",
            "see all",
            "cyber hack",
            "republic",
            "canada",
            "season",
            "joe tidy",
            "sarah rainsford",
            "podcast",
            "bank",
            "ukraine",
            "dead",
            "indonesia",
            "police",
            "premium",
            "napoleon",
            "revolution",
            "michelangelo",
            "mozart",
            "global",
            "solid",
            "lazarus",
            "jabber zeus",
            "harrods",
            "ta markmonitor",
            "markmonitor",
            "search",
            "present aug",
            "unknown aaaa",
            "unknown soa",
            "win32",
            "invalid url",
            "trojanspy",
            "mtb apr",
            "backdoor",
            "next associated",
            "win64",
            "trojandropper",
            "twitter",
            "virtool",
            "ransom",
            "worm",
            "dynamicloader",
            "tlsv1",
            "high",
            "globalc",
            "medium",
            "windows",
            "cmd c",
            "delete c",
            "stream",
            "write",
            "next",
            "process32nextw",
            "http host",
            "dns query",
            "likely gandcrab",
            "et trojan",
            "windows nt",
            "wow64",
            "malware",
            "ms windows",
            "as16509",
            "as54113",
            "yara rule",
            "pe32 executable",
            "as15169",
            "powershell",
            "unknown",
            "response ip",
            "address google",
            "safe browsing",
            "hostname add",
            "port",
            "destination",
            "pe32",
            "intel",
            "error",
            "show",
            "delphi",
            "dcom",
            "form",
            "canvas",
            "united kingdom",
            "content type",
            "security",
            "moved",
            "great britain",
            "unknown a",
            "body doctype",
            "html public",
            "ietfdtd html",
            "showing",
            "packing t1045",
            "bytes",
            "read",
            "default",
            "christoper p ahmann",
            "target",
            "victims",
            "tsara brashears",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "present nov",
            "present oct",
            "date",
            "tcpmemhit",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "palantir",
            "foundry",
            "hitmen",
            "quasi",
            "government contracts",
            "jeffrey reimer",
            "hallrender",
            "workers compensation",
            "record value",
            "certificate"
          ],
          "references": [
            "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
            "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "bpc-old.palantirfoundry.com",
            "OTX auto populated  targeted groups.",
            "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
            "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
            "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
            "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
            "They blatantly steal from citizens , blame foreign entities.",
            "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
          ],
          "public": 1,
          "adversary": "Lazarus",
          "targeted_countries": [
            "Bangladesh",
            "Japan",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:SpikeAexR.PEVPSZL",
              "display_name": "ALF:SpikeAexR.PEVPSZL",
              "target": null
            },
            {
              "id": "Ransom:MSIL/GandCrab",
              "display_name": "Ransom:MSIL/GandCrab",
              "target": "/malware/Ransom:MSIL/GandCrab"
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "Ransom:Win32/Gandcrab.H!MTB",
              "display_name": "Ransom:Win32/Gandcrab.H!MTB",
              "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [
            "Banks",
            "Crypto",
            "Entertainment",
            "Bank"
          ],
          "TLP": "white",
          "cloned_from": "6910cafb096eae0dcb39a800",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4572,
            "FileHash-MD5": 196,
            "domain": 1523,
            "hostname": 1393,
            "FileHash-SHA256": 2400,
            "FileHash-SHA1": 175,
            "email": 18,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 10285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "131 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d5f0ceef9edb23a8f2ffd0",
          "name": "Upatre hopefully no longer connected to National corporation & clients",
          "description": "Trojandownloader:Win32/Upatre: Affecting a National corporation with many thousands of clients.",
          "modified": "2025-10-25T18:00:56.070000",
          "created": "2025-09-26T01:47:58.344000",
          "tags": [
            "passive dns",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses otx",
            "pulses",
            "ip address",
            "related nids",
            "files location",
            "united",
            "flag united",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "status",
            "name servers",
            "creation date",
            "search",
            "expiration date",
            "hostname add",
            "date",
            "unknown ns",
            "domain",
            "registrar",
            "markmonitor",
            "showing",
            "present feb",
            "present jul",
            "aaaa",
            "domain related",
            "pulses none",
            "related tags",
            "dnssec",
            "domain add",
            "win32upatre sep",
            "entries",
            "next associated",
            "title",
            "body",
            "msie",
            "present aug",
            "backdoor",
            "mtb sep",
            "trojandropper",
            "asn as16509",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "yara detections",
            "upatre",
            "binary file",
            "dynamic",
            "write",
            "copy",
            "canada unknown",
            "location canada",
            "asn as852",
            "tags none",
            "welcome",
            "td tr",
            "north east",
            "online network",
            "dawson creek",
            "neonet title",
            "surf td",
            "neonet td",
            "service td",
            "contact",
            "click",
            "june",
            "show",
            "default",
            "present sep",
            "ip related",
            "expiration",
            "url http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 679,
            "domain": 376,
            "hostname": 311,
            "FileHash-SHA256": 188,
            "email": 5,
            "FileHash-MD5": 113,
            "FileHash-SHA1": 110
          },
          "indicator_count": 1782,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "176 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents.",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
        "bpc-old.palantirfoundry.com",
        "OTX auto populated  targeted groups.",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "They blatantly steal from citizens , blame foreign entities."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Lazarus"
          ],
          "malware_families": [
            "Ransom:msil/gandcrab",
            "Zeus",
            "Other malware",
            "Alf:spikeaexr.pevpszl",
            "Ransom:win32/gandcrab.h!mtb"
          ],
          "industries": [
            "Entertainment",
            "Crypto",
            "Banks",
            "Bank"
          ],
          "unique_indicators": 12126
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/sos-file.com",
    "whois": "http://whois.domaintools.com/sos-file.com",
    "domain": "sos-file.com",
    "hostname": "ww12.sos-file.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "6910cafb096eae0dcb39a800",
      "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
      "description": "Chronicles of how  quasi government , a State owned criminal defense attorney , protects sexual assaulter Jeffrey Reimer DPT.   victim Palantir harassed, withheld healthcare , diagnoses, justice, monetary award for injured, stole insurance policies, hacked Denver artists, sold music her to artists whom profited, hacked  Denver music studios, hired stalkers, human, controlled phone , car and everything in targets life including , doctors, attorneys, hospitals. It\u2019s always been clear to coming us that Anonymous and Lazarus are the police, judge , lawyer, ransom racist.\nThis group alone has cost the US billions! Responsible for 2014 Sony hack , FMOE.\nDirect Link. by phone , email in person contact , forced settlement hearing,. Adversarial Christopher P. Ahmann , relationship w / Lazarus group, hitmen , cyber crime and other crimes against persons.\n #rip #christopher_ahmann #palantir #lazarus #target_tsara_brashears",
      "modified": "2025-12-09T17:03:48.645000",
      "created": "2025-11-09T17:10:19.498000",
      "tags": [
        "url http",
        "apple",
        "california",
        "apple public",
        "server rsa",
        "organization",
        "stateprovince",
        "ocsp",
        "nids united",
        "files",
        "united",
        "unknown ns",
        "ip address",
        "domain",
        "urls files",
        "passive dns",
        "found title",
        "sf hello",
        "myriad set",
        "pro myriad",
        "set lucida",
        "grande arial",
        "sf mono",
        "ipv4",
        "location united",
        "america flag",
        "america asn",
        "verdict",
        "files ip",
        "address",
        "as42 woodynet",
        "domain add",
        "ipv4 add",
        "reverse dns",
        "trojan",
        "name servers",
        "emails",
        "for privacy",
        "ltd dba",
        "com laude",
        "servers",
        "expiration date",
        "urls",
        "meta",
        "a domains",
        "country code",
        "store home",
        "title",
        "accept",
        "espaol",
        "english",
        "evil corp",
        "see all",
        "cyber hack",
        "republic",
        "canada",
        "season",
        "joe tidy",
        "sarah rainsford",
        "podcast",
        "bank",
        "ukraine",
        "dead",
        "indonesia",
        "police",
        "premium",
        "napoleon",
        "revolution",
        "michelangelo",
        "mozart",
        "global",
        "solid",
        "lazarus",
        "jabber zeus",
        "harrods",
        "ta markmonitor",
        "markmonitor",
        "search",
        "present aug",
        "unknown aaaa",
        "unknown soa",
        "win32",
        "invalid url",
        "trojanspy",
        "mtb apr",
        "backdoor",
        "next associated",
        "win64",
        "trojandropper",
        "twitter",
        "virtool",
        "ransom",
        "worm",
        "dynamicloader",
        "tlsv1",
        "high",
        "globalc",
        "medium",
        "windows",
        "cmd c",
        "delete c",
        "stream",
        "write",
        "next",
        "process32nextw",
        "http host",
        "dns query",
        "likely gandcrab",
        "et trojan",
        "windows nt",
        "wow64",
        "malware",
        "ms windows",
        "as16509",
        "as54113",
        "yara rule",
        "pe32 executable",
        "as15169",
        "powershell",
        "unknown",
        "response ip",
        "address google",
        "safe browsing",
        "hostname add",
        "port",
        "destination",
        "pe32",
        "intel",
        "error",
        "show",
        "delphi",
        "dcom",
        "form",
        "canvas",
        "united kingdom",
        "content type",
        "security",
        "moved",
        "great britain",
        "unknown a",
        "body doctype",
        "html public",
        "ietfdtd html",
        "showing",
        "packing t1045",
        "bytes",
        "read",
        "default",
        "christoper p ahmann",
        "target",
        "victims",
        "tsara brashears",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "p1377925676",
        "gaz1",
        "sid1696503456",
        "present nov",
        "present oct",
        "date",
        "tcpmemhit",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "palantir",
        "foundry",
        "hitmen",
        "quasi",
        "government contracts",
        "jeffrey reimer",
        "hallrender",
        "workers compensation",
        "record value",
        "certificate"
      ],
      "references": [
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "bpc-old.palantirfoundry.com",
        "OTX auto populated  targeted groups.",
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "They blatantly steal from citizens , blame foreign entities.",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
      ],
      "public": 1,
      "adversary": "Lazarus",
      "targeted_countries": [
        "Bangladesh",
        "Japan",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:SpikeAexR.PEVPSZL",
          "display_name": "ALF:SpikeAexR.PEVPSZL",
          "target": null
        },
        {
          "id": "Ransom:MSIL/GandCrab",
          "display_name": "Ransom:MSIL/GandCrab",
          "target": "/malware/Ransom:MSIL/GandCrab"
        },
        {
          "id": "Zeus",
          "display_name": "Zeus",
          "target": null
        },
        {
          "id": "Ransom:Win32/Gandcrab.H!MTB",
          "display_name": "Ransom:Win32/Gandcrab.H!MTB",
          "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [
        "Banks",
        "Crypto",
        "Entertainment",
        "Bank"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4572,
        "FileHash-MD5": 196,
        "domain": 1523,
        "hostname": 1393,
        "FileHash-SHA256": 2400,
        "FileHash-SHA1": 175,
        "email": 18,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 10285,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "131 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69138a8144a8bf8040a92711",
      "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Counsel for egregious criminal acts \u2022 Christopher P. Ahmann attorney at Large",
      "description": "",
      "modified": "2025-12-09T17:03:48.645000",
      "created": "2025-11-11T19:12:01.843000",
      "tags": [
        "url http",
        "apple",
        "california",
        "apple public",
        "server rsa",
        "organization",
        "stateprovince",
        "ocsp",
        "nids united",
        "files",
        "united",
        "unknown ns",
        "ip address",
        "domain",
        "urls files",
        "passive dns",
        "found title",
        "sf hello",
        "myriad set",
        "pro myriad",
        "set lucida",
        "grande arial",
        "sf mono",
        "ipv4",
        "location united",
        "america flag",
        "america asn",
        "verdict",
        "files ip",
        "address",
        "as42 woodynet",
        "domain add",
        "ipv4 add",
        "reverse dns",
        "trojan",
        "name servers",
        "emails",
        "for privacy",
        "ltd dba",
        "com laude",
        "servers",
        "expiration date",
        "urls",
        "meta",
        "a domains",
        "country code",
        "store home",
        "title",
        "accept",
        "espaol",
        "english",
        "evil corp",
        "see all",
        "cyber hack",
        "republic",
        "canada",
        "season",
        "joe tidy",
        "sarah rainsford",
        "podcast",
        "bank",
        "ukraine",
        "dead",
        "indonesia",
        "police",
        "premium",
        "napoleon",
        "revolution",
        "michelangelo",
        "mozart",
        "global",
        "solid",
        "lazarus",
        "jabber zeus",
        "harrods",
        "ta markmonitor",
        "markmonitor",
        "search",
        "present aug",
        "unknown aaaa",
        "unknown soa",
        "win32",
        "invalid url",
        "trojanspy",
        "mtb apr",
        "backdoor",
        "next associated",
        "win64",
        "trojandropper",
        "twitter",
        "virtool",
        "ransom",
        "worm",
        "dynamicloader",
        "tlsv1",
        "high",
        "globalc",
        "medium",
        "windows",
        "cmd c",
        "delete c",
        "stream",
        "write",
        "next",
        "process32nextw",
        "http host",
        "dns query",
        "likely gandcrab",
        "et trojan",
        "windows nt",
        "wow64",
        "malware",
        "ms windows",
        "as16509",
        "as54113",
        "yara rule",
        "pe32 executable",
        "as15169",
        "powershell",
        "unknown",
        "response ip",
        "address google",
        "safe browsing",
        "hostname add",
        "port",
        "destination",
        "pe32",
        "intel",
        "error",
        "show",
        "delphi",
        "dcom",
        "form",
        "canvas",
        "united kingdom",
        "content type",
        "security",
        "moved",
        "great britain",
        "unknown a",
        "body doctype",
        "html public",
        "ietfdtd html",
        "showing",
        "packing t1045",
        "bytes",
        "read",
        "default",
        "christoper p ahmann",
        "target",
        "victims",
        "tsara brashears",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "p1377925676",
        "gaz1",
        "sid1696503456",
        "present nov",
        "present oct",
        "date",
        "tcpmemhit",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "palantir",
        "foundry",
        "hitmen",
        "quasi",
        "government contracts",
        "jeffrey reimer",
        "hallrender",
        "workers compensation",
        "record value",
        "certificate"
      ],
      "references": [
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "bpc-old.palantirfoundry.com",
        "OTX auto populated  targeted groups.",
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "They blatantly steal from citizens , blame foreign entities.",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
      ],
      "public": 1,
      "adversary": "Lazarus",
      "targeted_countries": [
        "Bangladesh",
        "Japan",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:SpikeAexR.PEVPSZL",
          "display_name": "ALF:SpikeAexR.PEVPSZL",
          "target": null
        },
        {
          "id": "Ransom:MSIL/GandCrab",
          "display_name": "Ransom:MSIL/GandCrab",
          "target": "/malware/Ransom:MSIL/GandCrab"
        },
        {
          "id": "Zeus",
          "display_name": "Zeus",
          "target": null
        },
        {
          "id": "Ransom:Win32/Gandcrab.H!MTB",
          "display_name": "Ransom:Win32/Gandcrab.H!MTB",
          "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [
        "Banks",
        "Crypto",
        "Entertainment",
        "Bank"
      ],
      "TLP": "white",
      "cloned_from": "6910cafb096eae0dcb39a800",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4572,
        "FileHash-MD5": 196,
        "domain": 1523,
        "hostname": 1393,
        "FileHash-SHA256": 2400,
        "FileHash-SHA1": 175,
        "email": 18,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 10285,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "131 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d5f0ceef9edb23a8f2ffd0",
      "name": "Upatre hopefully no longer connected to National corporation & clients",
      "description": "Trojandownloader:Win32/Upatre: Affecting a National corporation with many thousands of clients.",
      "modified": "2025-10-25T18:00:56.070000",
      "created": "2025-09-26T01:47:58.344000",
      "tags": [
        "passive dns",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses otx",
        "pulses",
        "ip address",
        "related nids",
        "files location",
        "united",
        "flag united",
        "ipv4 add",
        "pulse submit",
        "url analysis",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "status",
        "name servers",
        "creation date",
        "search",
        "expiration date",
        "hostname add",
        "date",
        "unknown ns",
        "domain",
        "registrar",
        "markmonitor",
        "showing",
        "present feb",
        "present jul",
        "aaaa",
        "domain related",
        "pulses none",
        "related tags",
        "dnssec",
        "domain add",
        "win32upatre sep",
        "entries",
        "next associated",
        "title",
        "body",
        "msie",
        "present aug",
        "backdoor",
        "mtb sep",
        "trojandropper",
        "asn as16509",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "yara detections",
        "upatre",
        "binary file",
        "dynamic",
        "write",
        "copy",
        "canada unknown",
        "location canada",
        "asn as852",
        "tags none",
        "welcome",
        "td tr",
        "north east",
        "online network",
        "dawson creek",
        "neonet title",
        "surf td",
        "neonet td",
        "service td",
        "contact",
        "click",
        "june",
        "show",
        "default",
        "present sep",
        "ip related",
        "expiration",
        "url http"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 679,
        "domain": 376,
        "hostname": 311,
        "FileHash-SHA256": 188,
        "email": 5,
        "FileHash-MD5": 113,
        "FileHash-SHA1": 110
      },
      "indicator_count": 1782,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "176 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ww12.sos-file.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ww12.sos-file.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776660237.4292586
}