{
  "type": "URL",
  "indicator": "https://www.gacyhis.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.gacyhis.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2745696921,
      "indicator": "https://www.gacyhis.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 24,
      "pulses": [
        {
          "id": "68ec0870475174302c733fa2",
          "name": "Cyber Crime - Emotet | Tofsee CnC | Targeting \u2022  Streaming \u2022 Stealing",
          "description": "I\u2019ve heard of mortis.com from a target. It was heavily suggested on targets YouTube homepage. I hadn\u2019t had thought to research link until Friday.\n\n Doing my due diligence I\u2019ve been viewing potential issues targets family member/s may be and his having with technology.\n\nSmart TV is completely hacked. playlist tampering , heavy downloading daily  when TV is on , off or unplugged. \n I watched this TV monitored data volume , noted    continued suggestions for Mortis.com , \ntouted  . Obviously, a threat. YouTuber warns not go in and no one can get in which is insanely stupid.  OTX issues,. Several pulse attempts later ,  constant refreshing and deleting of IoC this is all what remains. Streaming services, webcams and multiple labeled rooms. I have no idea the point of  death threats especially since God can mow anyone down. Who promised you another breath? Target seems to be  the only person targeted. Multiple Foundry , PayPal  Palantir\nLinks , Boeing, JetBlue Twitter , Apple loading issues.",
          "modified": "2025-11-11T04:02:27.091000",
          "created": "2025-10-12T19:58:40.472000",
          "tags": [
            "url https",
            "indicator role",
            "active related",
            "united",
            "ip address",
            "unknown ns",
            "x82xd4",
            "x86xd3",
            "xa1xf1",
            "xe8xc2x14",
            "win32tofsee",
            "trojan",
            "win32tofsee att",
            "ck ids",
            "t1096",
            "ntfs file",
            "service",
            "united kingdom",
            "germany",
            "netherlands",
            "mortis.com",
            "dead",
            "death",
            "foundry",
            "paypal",
            "home visitor",
            "psalms 37",
            "trojan",
            "emotet",
            "boeing",
            "apple",
            "streaming",
            "kryptik",
            "myundeadneighbor",
            "windstream communications llc",
            "command",
            "tofsee",
            "kx81xdbx0f",
            "wx99xcdx11",
            "stream",
            "write",
            "malware",
            "tsara brashears",
            "regsetvalueexa",
            "malware",
            "win32",
            "persistence",
            "execution",
            "push",
            "shellexecuteexw",
            "windows",
            "botnet",
            "backdoor",
            "writeconsolew",
            "displayname",
            "sddl",
            "hash",
            "ip address",
            "ssl certificate",
            "spawns",
            "initial access",
            "adversaries",
            "name tactics",
            "t1031",
            "registry",
            "dock",
            "suspicious",
            "learn",
            "phishing att",
            "infection",
            "commandand_and_control",
            "informative",
            "jetblue",
            "porn",
            "keylogger",
            "remote keylogger",
            "parklogic",
            "parking crew",
            "park pages",
            "cyber crime",
            "data brokers",
            "info stealers",
            "password",
            "masquerading",
            "discord",
            "sophisticated",
            "dga domains",
            "pit",
            "rotor",
            "hello",
            "targeting",
            "games"
          ],
          "references": [
            "mortis.com",
            "I unintentionally made the first pulse Public.",
            "Stalker/Lurker?http://myundeadneighbor.com | Parking Crews | Parklogic",
            "assassinationmarkets.com",
            "https://id.security.trackid",
            "https://id.security.trackid.piwikb7c1867dd7ba9c57.2ce7e2c4000f72e3204af57fac31aafd.mailingmarketing.net/",
            "https://id.login.update.ssl.encryption-6159368de39251d7a-login.id.security.trackid.piwikb7c1867dd7ba9c57.e988d676bdb63f3b4dbcdc53578a9b26.mailingmarketing.net/",
            "Hmm, cyber criminals use parking pages for malvertizing malicious content & intent  , reputation content, etc",
            "https://www.gov.pl/attachment/65dfce94-31f9-4523-8d3b-89df3d4c5f75"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Emotet.PC!MTB",
              "display_name": "Trojan:Win32/Emotet.PC!MTB",
              "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
            },
            {
              "id": "Trojan:Win32/Emotet.KDS!MTB",
              "display_name": "Trojan:Win32/Emotet.KDS!MTB",
              "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Malware.Tofsee-6880878-0",
              "display_name": "Win.Malware.Tofsee-6880878-0",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win32:Kryptik-PLL",
              "display_name": "Win32:Kryptik-PLL",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2407,
            "domain": 2321,
            "hostname": 983,
            "FileHash-SHA256": 3035,
            "FileHash-MD5": 228,
            "FileHash-SHA1": 231,
            "email": 1,
            "FilePath": 3
          },
          "indicator_count": 9209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "159 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ddc9048ba0719321307d03",
          "name": "Malicious Probe - WannaCry \u2022 WannaCrypt- Ransomware",
          "description": "Malicious remote cab / drive by via an alt google redirect , clicked image , suspicious, low amount of search results.\nRead coded image. Target/s phone -cnc and infected. #dead_connect #decrypted #hacked #nametactics",
          "modified": "2025-11-01T00:02:59.726000",
          "created": "2025-10-02T00:36:20.247000",
          "tags": [
            "ip address",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "cus ogoogle",
            "trust",
            "cnwr3 validity",
            "subject public",
            "key info",
            "links",
            "dynamicloader",
            "high",
            "et exploit",
            "ms17010",
            "msf style",
            "probe ms17010",
            "generic flags",
            "dns lookup",
            "ransom",
            "write",
            "malware",
            "wannacrypt",
            "wannacry",
            "eternal blue",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "development att",
            "ssl certificate",
            "programfiles",
            "username",
            "windir",
            "userprofile",
            "mitre att",
            "ck matrix",
            "localappdata",
            "comspec",
            "model",
            "hybrid",
            "path",
            "click",
            "strings",
            "sabey type",
            "quasi type",
            "pegasus relationship",
            "fbi? files"
          ],
          "references": [
            "www.forensickb.com \u2022 Computer Forensics, Malware Analysis & Digital Investigations",
            "Eternal Blue Wannacry \u2022 WannaCry Crypter",
            "https://hybrid-analysis.com/sample/8ed6c58fb2a5d50252bf106d31ed9e230925124443e4243bec9515c82ef0450c/68ddc351e27cb562e902d674"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCrypt",
              "display_name": "WannaCrypt",
              "target": null
            },
            {
              "id": "Eternal Blue",
              "display_name": "Eternal Blue",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4246,
            "domain": 757,
            "hostname": 1039,
            "email": 1,
            "FileHash-SHA256": 2738,
            "FileHash-SHA1": 152,
            "FileHash-MD5": 140,
            "CVE": 1,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 9077,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "169 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ddc902283b04c489f7e1cd",
          "name": "Malicious Probe - WannaCry \u2022 WannaCrypt- Ransomware",
          "description": "Malicious remote cab / drive by via an alt google redirect , clicked image , suspicious, low amount of search results.\nRead coded image. Target/s phone -cnc and infected. #dead_connect #decrypted #hacked #nametactics",
          "modified": "2025-11-01T00:02:59.726000",
          "created": "2025-10-02T00:36:18.296000",
          "tags": [
            "ip address",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "cus ogoogle",
            "trust",
            "cnwr3 validity",
            "subject public",
            "key info",
            "links",
            "dynamicloader",
            "high",
            "et exploit",
            "ms17010",
            "msf style",
            "probe ms17010",
            "generic flags",
            "dns lookup",
            "ransom",
            "write",
            "malware",
            "wannacrypt",
            "wannacry",
            "eternal blue",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "development att",
            "ssl certificate",
            "programfiles",
            "username",
            "windir",
            "userprofile",
            "mitre att",
            "ck matrix",
            "localappdata",
            "comspec",
            "model",
            "hybrid",
            "path",
            "click",
            "strings",
            "sabey type",
            "quasi type",
            "pegasus relationship",
            "fbi? files"
          ],
          "references": [
            "www.forensickb.com \u2022 Computer Forensics, Malware Analysis & Digital Investigations",
            "Eternal Blue Wannacry \u2022 WannaCry Crypter",
            "https://hybrid-analysis.com/sample/8ed6c58fb2a5d50252bf106d31ed9e230925124443e4243bec9515c82ef0450c/68ddc351e27cb562e902d674"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCrypt",
              "display_name": "WannaCrypt",
              "target": null
            },
            {
              "id": "Eternal Blue",
              "display_name": "Eternal Blue",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4246,
            "domain": 757,
            "hostname": 1039,
            "email": 1,
            "FileHash-SHA256": 2738,
            "FileHash-SHA1": 152,
            "FileHash-MD5": 140,
            "CVE": 1,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 9077,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "169 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "688c8526be7a4df33863b5c5",
          "name": "VirusTotal - Shiz.ivr",
          "description": "*Win.Trojan.Shiz.ivr\n*PWS:Win32/Simda.D\n*virtool #injection#infostealer #network #cnc #block_not #virustotal_google #cnc #checking #procmem_yara\n#injection_inter_process\n#injection_create_remote_thread\n#antidebug_windows\n#multiple_useragents\n#network_fake_useragent\n#persistence_autorun\n#cape_detected_threat\n#antiav_detectfile\n#modify_proxy\n#deletes_self\n#infostealer_cookies\n#injection_createremotethread\n#suricata_alert\n~ vashti",
          "modified": "2025-08-31T08:01:04.297000",
          "created": "2025-08-01T09:13:10.510000",
          "tags": [
            "dynamicloader",
            "unknown",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "suspicious",
            "search",
            "high",
            "show",
            "copy",
            "possible",
            "write",
            "internal",
            "malware",
            "push",
            "local",
            "next",
            "contacted",
            "domains",
            "pulses",
            "related tags",
            "file type",
            "date april",
            "pm size",
            "sha1 sha256",
            "imphash pehash",
            "virustotal api",
            "bq jul",
            "united",
            "trojan",
            "backdoor",
            "virtool",
            "cnc beacon",
            "entries",
            "path max",
            "passive dns",
            "next associated",
            "cookie",
            "twitter",
            "body",
            "date",
            "medium",
            "simda",
            "global"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10303,
            "hostname": 1413,
            "FileHash-SHA256": 1868,
            "domain": 1877,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 348,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 16168,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 145,
          "modified_text": "231 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a7e576b3cbdf2f86a32acc",
          "name": "Skynet | prd.connectforhealthco.com | Identity theft |",
          "description": "Remote interception of health insurance applicants call.  Social engineering - threat actor will walk target through process beginning with; verification of phone model, browser used, phone number, email, ssn# entered in staged health insurance enrollment application. Auto forwards ssn#  to Experian, locking consumer from of all accounts, credit information is stolen, consumer identity theft. New accounts cannot be created, a password reset is required for scam, all emails requested,  bad actor will ask for entire households email accounts, device use, etc.  Sends malicious forms to devices. Takes consumer through a lengthy phone transfer scheme  +++",
          "modified": "2024-02-16T13:04:46.804000",
          "created": "2024-01-17T14:34:30.204000",
          "tags": [
            "whois record",
            "historical ssl",
            "ssl certificate",
            "april",
            "referrer",
            "threat roundup",
            "communicating",
            "whois",
            "rwi dtools",
            "jekyll",
            "metro",
            "skynet",
            "identity theft",
            "parking crew",
            "whois whois",
            "resolutions",
            "october",
            "august",
            "march",
            "june",
            "attack",
            "goldfinder",
            "sibot",
            "hacktool",
            "remote attack",
            "social engineering",
            "read c",
            "get autoit",
            "search",
            "regsetvalueexa",
            "show",
            "entries",
            "regdword",
            "intel",
            "ms windows",
            "showing",
            "autoit",
            "write",
            "worm",
            "copy",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "malware",
            "autorun",
            "redacted for",
            "for privacy",
            "name servers",
            "date",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "encrypt",
            "next",
            "sabey",
            "no expiration",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "iocs",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "malware beacon",
            "useragent",
            "http request",
            "hostile",
            "autoit windows",
            "automation tool",
            "forbidden",
            "algorithm",
            "full name",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "info",
            "first",
            "detections type",
            "name",
            "javascript",
            "pdf community",
            "office open",
            "xml spreadsheet",
            "text",
            "siblings",
            "process32nextw",
            "fjlsedauv",
            "writeconsolea",
            "medium",
            "discovery",
            "high",
            "module load",
            "t1129",
            "united",
            "as63949 linode",
            "mtb jan",
            "passive dns",
            "backdoor",
            "mtb dec",
            "open",
            "body",
            "artro",
            "creation date",
            "servers",
            "urls",
            "record value",
            "expiration date",
            "vt graph",
            "parent referrer",
            "apple private",
            "data collection",
            "hidden privacy",
            "malicious",
            "verified",
            "utc submissions",
            "submitters",
            "summary iocs",
            "graph community",
            "tucows",
            "amazonaes",
            "china telecom",
            "group",
            "cloudflarenet",
            "akamaias",
            "pty ltd",
            "argon data",
            "communication",
            "limited",
            "digitaloceanasn",
            "twitter",
            "dropbox",
            "domainsite",
            "alibaba cloud",
            "computing",
            "beijing",
            "service",
            "ip address",
            "latest",
            "virustotal",
            "unclejohn",
            "us autonomous",
            "system46606",
            "unified layer",
            "urls latest",
            "contacted",
            "historical",
            "subdomains",
            "gootloader",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "binary",
            "sameorigin",
            "scammer",
            "spammer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "Sibot - S0589",
              "display_name": "Sibot - S0589",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
              "display_name": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
              "target": null
            },
            {
              "id": "W32/Expiro.fam",
              "display_name": "W32/Expiro.fam",
              "target": null
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1460",
              "name": "Biometric Spoofing",
              "display_name": "T1460 - Biometric Spoofing"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            }
          ],
          "industries": [
            "Healthcare",
            "Insurance",
            "Finance",
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 515,
            "FileHash-SHA1": 504,
            "FileHash-SHA256": 3557,
            "URL": 5450,
            "domain": 1842,
            "hostname": 2221,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 14097,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "793 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658449d3f6ec1af2f3aace46",
          "name": "Qakbot | Reddit",
          "description": "Qbot URL: https://seedbeej.pk/tin/index.php?QBOT.zip Qbot zip found in Reddit Honeypot link: https://www.reddit.com/user backdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork with many capabilities, attack methods and demands. An unsuspecting victim always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware  malvertizing, fraud services, leads to full control of badly compromised digital profile.",
          "modified": "2024-01-20T02:02:19.559000",
          "created": "2023-12-21T14:21:07.435000",
          "tags": [
            "ssl certificate",
            "iocs",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "threat",
            "paste",
            "blacklist https",
            "qakbot",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "ascii text",
            "pattern match",
            "file",
            "windows nt",
            "appdata",
            "indicator",
            "crlf line",
            "unicode text",
            "jpeg image",
            "mitre att",
            "hybrid",
            "general",
            "local",
            "error",
            "click",
            "strings",
            "microsoft",
            "threat analyzer",
            "urls https",
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "heur",
            "malware site",
            "malicious site",
            "safe site",
            "malware",
            "html",
            "phishing site",
            "site top",
            "riskware",
            "unsafe",
            "artemis",
            "quasar rat",
            "downldr",
            "agent",
            "presenoker",
            "applicunwnt",
            "crack",
            "cve201711882",
            "win64",
            "iframe",
            "quasar",
            "trojanspy",
            "exit",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "traffic",
            "anonymizer",
            "brasil",
            "phishing three",
            "united",
            "phishing bank",
            "virustotal",
            "tech",
            "bank",
            "maltiverse",
            "hidelink",
            "samples",
            "spyware",
            "injector",
            "mon jan",
            "tld count",
            "wed dec",
            "download",
            "first",
            "team",
            "simda",
            "bambernek",
            "simda simda",
            "infy",
            "alexa",
            "gregory",
            "cyber threat",
            "phishing",
            "engineering",
            "covid19",
            "telefonica co",
            "malicious",
            "zbot",
            "zeus",
            "betabot",
            "suppobox",
            "citadel",
            "pony",
            "kraken",
            "redline stealer",
            "ransomware",
            "vawtrak",
            "athena",
            "neutrino",
            "alina",
            "andromeda",
            "dexter",
            "unknown",
            "keylogger",
            "hawkeye",
            "phase",
            "jackpos",
            "plasma",
            "spyeye",
            "spitmo",
            "slingshot",
            "ramnit",
            "emotet",
            "pykspa",
            "virut",
            "installcore",
            "dorkbot",
            "bondat",
            "union",
            "vskimmer",
            "xtrat",
            "solar",
            "grandcrab",
            "nymaim",
            "matsnu",
            "cutwail",
            "cobalt strike",
            "hydra",
            "tinba",
            "nsis",
            "memscan",
            "deepscan",
            "runescape",
            "backdoor",
            "reddit",
            "tulach",
            "password stealer",
            "active threat",
            "apple",
            "pinkslipbot",
            "icloud",
            "free",
            "apple"
          ],
          "references": [
            "https://seedbeej.pk/tin/index.php?QBOT.zip.  [Qbot zip]",
            "https://tulach.cc/  [Botnet phishing]",
            "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
            "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
            "198.54.115.46            [exploit_source]",
            "gadyniw.com          [command_and_control]",
            "gahyqah.com          [command_and_control]",
            "galyqaz.com            [command_and_control]",
            "lyvyxor.com             [command_and_control]",
            "puzylyp.com           [command_and_control]",
            "malicious.high.ml   [dropper]",
            "https://www.reddit.com/user [honeypot]",
            "beacons.bcp.gvt.com   [tracking]",
            "https://www.norad.mil/   [tracking]",
            "www.norad.mil   [tracking]",
            "www.apple.com  [API property call]",
            "https://www.apple.com/qtactivex/qtplugin.cab   [https://www.icloud.com .cab]",
            "yesporn.fun",
            "http://114.114.114.114:90/p/cdbdd4a09a64909694281aec503746fd/mobile_index.html?MTE0LjExNC4xMTQuMTE0L2xvZ2luP2hhc19vcmlfdXJp [Tulach | Malicious]",
            "114.114.114.114  [Tulach | Virus Network IP]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "XRat",
              "display_name": "XRat",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "vSkimmer",
              "display_name": "vSkimmer",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Pykspa",
              "display_name": "Pykspa",
              "target": null
            },
            {
              "id": "SpyEye",
              "display_name": "SpyEye",
              "target": null
            },
            {
              "id": "Spitmo",
              "display_name": "Spitmo",
              "target": null
            },
            {
              "id": "Solar",
              "display_name": "Solar",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "DorkBot",
              "display_name": "DorkBot",
              "target": null
            },
            {
              "id": "Slingshot",
              "display_name": "Slingshot",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Plasma RAT",
              "display_name": "Plasma RAT",
              "target": null
            },
            {
              "id": "Neutrino",
              "display_name": "Neutrino",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "NSIS",
              "display_name": "NSIS",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "GrandCrab",
              "display_name": "GrandCrab",
              "target": null
            },
            {
              "id": "Andromeda",
              "display_name": "Andromeda",
              "target": null
            },
            {
              "id": "Alinaos",
              "display_name": "Alinaos",
              "target": null
            },
            {
              "id": "HawkEye",
              "display_name": "HawkEye",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Infy",
              "display_name": "Infy",
              "target": null
            },
            {
              "id": "Dexter",
              "display_name": "Dexter",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "ASCII",
              "display_name": "ASCII",
              "target": null
            },
            {
              "id": "Athena",
              "display_name": "Athena",
              "target": null
            },
            {
              "id": "Bambernek",
              "display_name": "Bambernek",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "COVID19",
              "display_name": "COVID19",
              "target": null
            },
            {
              "id": "Citadel",
              "display_name": "Citadel",
              "target": null
            },
            {
              "id": "Bondat",
              "display_name": "Bondat",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Hydra",
              "display_name": "Hydra",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Pinkslipbot",
              "display_name": "Pinkslipbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 124,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8736,
            "FileHash-MD5": 953,
            "FileHash-SHA1": 489,
            "FileHash-SHA256": 3566,
            "domain": 1516,
            "hostname": 2221,
            "CVE": 6
          },
          "indicator_count": 17487,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "820 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6583e3acc7f464d48a3503d1",
          "name": "Qkbot | Reddit",
          "description": "Qbot URL:  https://seedbeej.pk/tin/index.php?QBOT.zip found in Reddit Honeypot link: https://www.reddit.com/user\nbackdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork  with many capabilities, attack methods and demands.  An unsuspecting victim  always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware, malvertizing, fraud services, full control of badly compromised digital profiles which have been discovered.",
          "modified": "2024-01-20T02:02:19.559000",
          "created": "2023-12-21T07:05:16.695000",
          "tags": [
            "ssl certificate",
            "iocs",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "threat",
            "paste",
            "blacklist https",
            "qakbot",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "ascii text",
            "pattern match",
            "file",
            "windows nt",
            "appdata",
            "indicator",
            "crlf line",
            "unicode text",
            "jpeg image",
            "mitre att",
            "hybrid",
            "general",
            "local",
            "error",
            "click",
            "strings",
            "microsoft",
            "threat analyzer",
            "urls https",
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "heur",
            "malware site",
            "malicious site",
            "safe site",
            "malware",
            "html",
            "phishing site",
            "site top",
            "riskware",
            "unsafe",
            "artemis",
            "quasar rat",
            "downldr",
            "agent",
            "presenoker",
            "applicunwnt",
            "crack",
            "cve201711882",
            "win64",
            "iframe",
            "quasar",
            "trojanspy",
            "exit",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "traffic",
            "anonymizer",
            "brasil",
            "phishing three",
            "united",
            "phishing bank",
            "virustotal",
            "tech",
            "bank",
            "maltiverse",
            "hidelink",
            "samples",
            "spyware",
            "injector",
            "mon jan",
            "tld count",
            "wed dec",
            "download",
            "first",
            "team",
            "simda",
            "bambernek",
            "simda simda",
            "infy",
            "alexa",
            "gregory",
            "cyber threat",
            "phishing",
            "engineering",
            "covid19",
            "telefonica co",
            "malicious",
            "zbot",
            "zeus",
            "betabot",
            "suppobox",
            "citadel",
            "pony",
            "kraken",
            "redline stealer",
            "ransomware",
            "vawtrak",
            "athena",
            "neutrino",
            "alina",
            "andromeda",
            "dexter",
            "unknown",
            "keylogger",
            "hawkeye",
            "phase",
            "jackpos",
            "plasma",
            "spyeye",
            "spitmo",
            "slingshot",
            "ramnit",
            "emotet",
            "pykspa",
            "virut",
            "installcore",
            "dorkbot",
            "bondat",
            "union",
            "vskimmer",
            "xtrat",
            "solar",
            "grandcrab",
            "nymaim",
            "matsnu",
            "cutwail",
            "cobalt strike",
            "hydra",
            "tinba",
            "nsis",
            "memscan",
            "deepscan",
            "runescape",
            "backdoor",
            "reddit",
            "tulach"
          ],
          "references": [
            "https://seedbeej.pk/tin/index.php?QBOT.zip",
            "https://tulach.cc/ [phishing, exploits, malware spreader]",
            "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
            "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
            "198.54.115.46            [exploit_source]",
            "gadyniw.com          [command_and_control]",
            "gahyqah.com          [command_and_control]",
            "galyqaz.com            [command_and_control]",
            "lyvyxor.com             [command_and_control]",
            "puzylyp.com           [command_and_control]",
            "malicious.high.ml   [dropper]",
            "https://www.reddit.com/user"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "XRat",
              "display_name": "XRat",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "vSkimmer",
              "display_name": "vSkimmer",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Pykspa",
              "display_name": "Pykspa",
              "target": null
            },
            {
              "id": "SpyEye",
              "display_name": "SpyEye",
              "target": null
            },
            {
              "id": "Spitmo",
              "display_name": "Spitmo",
              "target": null
            },
            {
              "id": "Solar",
              "display_name": "Solar",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "DorkBot",
              "display_name": "DorkBot",
              "target": null
            },
            {
              "id": "Slingshot",
              "display_name": "Slingshot",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Plasma RAT",
              "display_name": "Plasma RAT",
              "target": null
            },
            {
              "id": "Neutrino",
              "display_name": "Neutrino",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "NSIS",
              "display_name": "NSIS",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "GrandCrab",
              "display_name": "GrandCrab",
              "target": null
            },
            {
              "id": "Andromeda",
              "display_name": "Andromeda",
              "target": null
            },
            {
              "id": "Alinaos",
              "display_name": "Alinaos",
              "target": null
            },
            {
              "id": "HawkEye",
              "display_name": "HawkEye",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Infy",
              "display_name": "Infy",
              "target": null
            },
            {
              "id": "Dexter",
              "display_name": "Dexter",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "ASCII",
              "display_name": "ASCII",
              "target": null
            },
            {
              "id": "Athena",
              "display_name": "Athena",
              "target": null
            },
            {
              "id": "Bambernek",
              "display_name": "Bambernek",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "COVID19",
              "display_name": "COVID19",
              "target": null
            },
            {
              "id": "Citadel",
              "display_name": "Citadel",
              "target": null
            },
            {
              "id": "Bondat",
              "display_name": "Bondat",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Hydra",
              "display_name": "Hydra",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8343,
            "FileHash-MD5": 953,
            "FileHash-SHA1": 489,
            "FileHash-SHA256": 3565,
            "domain": 1494,
            "hostname": 2218,
            "CVE": 6
          },
          "indicator_count": 17068,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "820 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6583e3a2d1432cbf9054d26d",
          "name": "Qkbot | Reddit",
          "description": "Qbot URL:  https://seedbeej.pk/tin/index.php?QBOT.zip found in Reddit Honeypot link: https://www.reddit.com/user\nbackdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork  with many capabilities, attack methods and demands.  An unsuspecting victim  always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware, malvertizing, fraud services, full control of badly compromised digital profiles which have been discovered.",
          "modified": "2024-01-20T02:02:19.559000",
          "created": "2023-12-21T07:05:06.936000",
          "tags": [
            "ssl certificate",
            "iocs",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "threat",
            "paste",
            "blacklist https",
            "qakbot",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "ascii text",
            "pattern match",
            "file",
            "windows nt",
            "appdata",
            "indicator",
            "crlf line",
            "unicode text",
            "jpeg image",
            "mitre att",
            "hybrid",
            "general",
            "local",
            "error",
            "click",
            "strings",
            "microsoft",
            "threat analyzer",
            "urls https",
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "heur",
            "malware site",
            "malicious site",
            "safe site",
            "malware",
            "html",
            "phishing site",
            "site top",
            "riskware",
            "unsafe",
            "artemis",
            "quasar rat",
            "downldr",
            "agent",
            "presenoker",
            "applicunwnt",
            "crack",
            "cve201711882",
            "win64",
            "iframe",
            "quasar",
            "trojanspy",
            "exit",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "traffic",
            "anonymizer",
            "brasil",
            "phishing three",
            "united",
            "phishing bank",
            "virustotal",
            "tech",
            "bank",
            "maltiverse",
            "hidelink",
            "samples",
            "spyware",
            "injector",
            "mon jan",
            "tld count",
            "wed dec",
            "download",
            "first",
            "team",
            "simda",
            "bambernek",
            "simda simda",
            "infy",
            "alexa",
            "gregory",
            "cyber threat",
            "phishing",
            "engineering",
            "covid19",
            "telefonica co",
            "malicious",
            "zbot",
            "zeus",
            "betabot",
            "suppobox",
            "citadel",
            "pony",
            "kraken",
            "redline stealer",
            "ransomware",
            "vawtrak",
            "athena",
            "neutrino",
            "alina",
            "andromeda",
            "dexter",
            "unknown",
            "keylogger",
            "hawkeye",
            "phase",
            "jackpos",
            "plasma",
            "spyeye",
            "spitmo",
            "slingshot",
            "ramnit",
            "emotet",
            "pykspa",
            "virut",
            "installcore",
            "dorkbot",
            "bondat",
            "union",
            "vskimmer",
            "xtrat",
            "solar",
            "grandcrab",
            "nymaim",
            "matsnu",
            "cutwail",
            "cobalt strike",
            "hydra",
            "tinba",
            "nsis",
            "memscan",
            "deepscan",
            "runescape",
            "backdoor",
            "reddit",
            "tulach"
          ],
          "references": [
            "https://seedbeej.pk/tin/index.php?QBOT.zip",
            "https://tulach.cc/ [phishing, exploits, malware spreader]",
            "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
            "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
            "198.54.115.46            [exploit_source]",
            "gadyniw.com          [command_and_control]",
            "gahyqah.com          [command_and_control]",
            "galyqaz.com            [command_and_control]",
            "lyvyxor.com             [command_and_control]",
            "puzylyp.com           [command_and_control]",
            "malicious.high.ml   [dropper]",
            "https://www.reddit.com/user"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "XRat",
              "display_name": "XRat",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "vSkimmer",
              "display_name": "vSkimmer",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Pykspa",
              "display_name": "Pykspa",
              "target": null
            },
            {
              "id": "SpyEye",
              "display_name": "SpyEye",
              "target": null
            },
            {
              "id": "Spitmo",
              "display_name": "Spitmo",
              "target": null
            },
            {
              "id": "Solar",
              "display_name": "Solar",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "DorkBot",
              "display_name": "DorkBot",
              "target": null
            },
            {
              "id": "Slingshot",
              "display_name": "Slingshot",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Plasma RAT",
              "display_name": "Plasma RAT",
              "target": null
            },
            {
              "id": "Neutrino",
              "display_name": "Neutrino",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "NSIS",
              "display_name": "NSIS",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "GrandCrab",
              "display_name": "GrandCrab",
              "target": null
            },
            {
              "id": "Andromeda",
              "display_name": "Andromeda",
              "target": null
            },
            {
              "id": "Alinaos",
              "display_name": "Alinaos",
              "target": null
            },
            {
              "id": "HawkEye",
              "display_name": "HawkEye",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Infy",
              "display_name": "Infy",
              "target": null
            },
            {
              "id": "Dexter",
              "display_name": "Dexter",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "ASCII",
              "display_name": "ASCII",
              "target": null
            },
            {
              "id": "Athena",
              "display_name": "Athena",
              "target": null
            },
            {
              "id": "Bambernek",
              "display_name": "Bambernek",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "COVID19",
              "display_name": "COVID19",
              "target": null
            },
            {
              "id": "Citadel",
              "display_name": "Citadel",
              "target": null
            },
            {
              "id": "Bondat",
              "display_name": "Bondat",
              "target": null
            },
            {
              "id": "HideLink",
              "display_name": "HideLink",
              "target": null
            },
            {
              "id": "Hydra",
              "display_name": "Hydra",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 98,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8343,
            "FileHash-MD5": 953,
            "FileHash-SHA1": 489,
            "FileHash-SHA256": 3565,
            "domain": 1494,
            "hostname": 2218,
            "CVE": 6
          },
          "indicator_count": 17068,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "820 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6561581c55aacc7f571968af",
          "name": "Mirai | Inmortal | Loki | SpyEye",
          "description": "attack, cyber threat, network, vehicle tracking, cnc, athena cyber stalking, betabot, social engineering, Cisco umbrella, bambernek simda, active threat, ongoing spreader, spyware, redline stealer, qakbot, anilise, milemighmedia, sweetheart videos botnetwork, targeting ,  redirects, network, targeted toyota tracking",
          "modified": "2023-12-25T01:00:05.300000",
          "created": "2023-11-25T02:12:44.278000",
          "tags": [
            "replication",
            "date",
            "graph summary",
            "ssl certificate",
            "contacted",
            "whois record",
            "historical ssl",
            "threat roundup",
            "august",
            "tsara brashears",
            "whois whois",
            "execution",
            "dropped",
            "february",
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "alexa top",
            "team",
            "malicious site",
            "malware",
            "phishing",
            "union",
            "bank",
            "unsafe",
            "united",
            "bambernek simda",
            "commerce",
            "pykspa",
            "bambernek",
            "ip reputation",
            "database",
            "vawtrak",
            "blacklist http",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "reverse dns",
            "software",
            "general full",
            "resource",
            "hash",
            "get h2",
            "protocol h2",
            "security tls",
            "url http",
            "main",
            "attention",
            "please",
            "adblock pro",
            "loki",
            "mon jul",
            "first",
            "linkid252669",
            "pjp3sltkz",
            "heur",
            "malware site",
            "phishing site",
            "artemis",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "nircmd",
            "swrort",
            "downldr",
            "crack",
            "filetour",
            "cleaner",
            "wacatac",
            "xtrat",
            "genkryptik",
            "opencandy",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "xrat",
            "coinminer",
            "dropper",
            "alexa",
            "acint",
            "systweak",
            "behav",
            "download",
            "zbot",
            "xtreme",
            "installcore",
            "unruy",
            "patcher",
            "adload",
            "win64",
            "applicunwnt",
            "trojanspy",
            "webtoolbar",
            "cyber threat",
            "engineering",
            "firehol",
            "phishtank",
            "emotet",
            "ransomware",
            "malicious",
            "cobalt strike",
            "suppobox",
            "bradesco",
            "facebook",
            "banco",
            "nymaim",
            "smsspy",
            "stealer",
            "service",
            "mirai",
            "pony",
            "nanocore",
            "asyncrat",
            "downloader",
            "deepscan",
            "virut",
            "qakbot",
            "name verdict",
            "falcon sandbox",
            "blacklist https",
            "malicious url",
            "filerepmetagen",
            "et cins",
            "active threat",
            "reputation ip",
            "threats et",
            "cins active",
            "poor reputation",
            "ip tcp",
            "C2",
            "command_and_control",
            "spyware",
            "tracking",
            "targeting",
            "cyber stalking",
            "hostname",
            "simda",
            "kraken",
            "betabot",
            "zeus",
            "ramnit",
            "plasma",
            "citadel",
            "athena",
            "neutrino",
            "alina",
            "andromeda",
            "dexter",
            "unknown",
            "keylogger",
            "hawkeye",
            "phase",
            "jackpos",
            "spyeye",
            "vskimmer",
            "spitmo",
            "slingshot",
            "warbot",
            "redline stealer",
            "steam",
            "bandoo",
            "matsnu",
            "maltiverse",
            "bambernek gen",
            "internet storm",
            "infy",
            "inmortal",
            "addtopayload",
            "attack",
            "malvertizing"
          ],
          "references": [
            "https://networkpccontrol.com/video-player-1/?clickid=4030fe2twwhgxaa9&domain=standardtrackerchain.com&uclick=e2twwhgx&uclickhash=e2twwhgx-e2twwhgx-xoq53y-0-3zvc3y-oj1m9r-oj1m1n-5da44a",
            "https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45/65609b66e63f64cae305c749",
            "https://www.hybrid-analysis.com/sample/347314196559e7fbc75fc532daa774727b897d3a2156ea1328861f3b66f677a5/656146284d68f73e2306b6ad",
            "http://dev.findatoyota.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "SpyEye",
              "display_name": "SpyEye",
              "target": null
            },
            {
              "id": "Citadel",
              "display_name": "Citadel",
              "target": null
            },
            {
              "id": "MilesMX",
              "display_name": "MilesMX",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 81,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2450,
            "FileHash-SHA256": 2684,
            "domain": 1254,
            "URL": 9244,
            "CVE": 13,
            "FileHash-MD5": 931,
            "FileHash-SHA1": 487
          },
          "indicator_count": 17063,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df1531ea0c35d79b1f4",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:49.909000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df2a7b287c614a94f94",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:50.158000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656e19dfeee6ead11dc6354e",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-12-04T18:26:39.448000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65612df2a7b287c614a94f94",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655f6edffd3910161c2ad1a2",
          "name": "D26A | DNSpionage| Qbot | Tulach Malaware | https://theanimallawfirm.com/ | FakeAlert",
          "description": "",
          "modified": "2023-12-23T07:03:55.171000",
          "created": "2023-11-23T15:25:19.843000",
          "tags": [
            "pattern match",
            "ascii text",
            "file",
            "jpeg image",
            "exif standard",
            "tiff image",
            "png image",
            "united",
            "baseline",
            "rgba",
            "date",
            "class",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "error",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "botnet command",
            "control server",
            "noname057",
            "facebook",
            "phishtank",
            "blacklist http",
            "organization",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "n64xtx0vpihxzc",
            "whois whois",
            "qpyrn6pd http",
            "referrer",
            "execution",
            "communicating",
            "core",
            "discord",
            "hiddentear",
            "metro",
            "probe",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bleachgap",
            "formbook",
            "nanocore",
            "roblox",
            "heur",
            "cyber threat",
            "engineering",
            "malware",
            "phishing",
            "malicious site",
            "phishing site",
            "covid19",
            "team",
            "bank",
            "cobalt strike",
            "artemis",
            "download",
            "zbot",
            "suppobox",
            "service",
            "downloader",
            "virut",
            "malicious",
            "emotet",
            "stealer",
            "exploit",
            "generic",
            "dropper",
            "unruy",
            "agent",
            "unsafe",
            "ramnit",
            "redline stealer",
            "smsspy",
            "bradesco",
            "fakealert",
            "qakbot",
            "outbreak",
            "qbot",
            "bankerx",
            "riskware",
            "nimda",
            "swrort",
            "adwind",
            "trojanx",
            "crack",
            "win64",
            "squirrelwaffle",
            "pony",
            "binder",
            "virustotal",
            "azorult",
            "zeus",
            "nymaim",
            "matsnu",
            "simda",
            "runescape",
            "cutwail",
            "dnspionage",
            "redirector",
            "fusioncore",
            "iframe",
            "killav",
            "raccoon",
            "daum",
            "installcore",
            "ransomware",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "presenoker",
            "downldr",
            "alexa",
            "applicunwnt",
            "opencandy",
            "cleaner",
            "wacatac",
            "xrat",
            "xtrat",
            "dbatloader",
            "infy",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "phish",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "qpyrn6pd",
            "spyware",
            "injector",
            "jul jan",
            "tag count",
            "tue jan",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/d4e0619008da0bf555fd1d9af2797eaed02c89512239cbdaf64c08e795bb9658",
            "http://www.jamesbgriffinlaw.com/wp-content/plugins/formcraft/file-upload/server/content/files/16132c66b562a3---dewubomojagorekijufuruni [ Malicious Plugins]",
            "*otc.greatcall.com    [Botnetwork]",
            "https://www.norad.mil/ [ Modified by others| Parking Crew - is a Tracker]",
            "https://otx.alienvault.com/indicator/url/http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Malware Server | iTunes path hacktool]",
            "tulach.cc.     [Malevolent | Modified description]",
            "https://tulach.cc/ [phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ ELF - Descriptions modified by others]",
            "https://www.pornhub.com/video/search?search=tsara+brashears [NORAD.mil phone tracking. Description modified]",
            "s3.amazonaws.com   [Virut Tsara Brashears Botnetwork | Modified description]"
          ],
          "public": 1,
          "adversary": "Qbot",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "655f6d89b33758a190399f39",
          "export_count": 86,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 897,
            "FileHash-SHA1": 479,
            "URL": 9847,
            "domain": 2344,
            "hostname": 2398,
            "CVE": 22,
            "FileHash-SHA256": 4712
          },
          "indicator_count": 20699,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "848 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655f6d89b33758a190399f39",
          "name": "Qbot | Miscellaneous Attacks",
          "description": "The following is a full list of links between malware and cyber-attackers, following a series of alerts from Phishtank, the UK-based cyber security firm, and the US government.",
          "modified": "2023-12-23T07:03:55.171000",
          "created": "2023-11-23T15:19:37.838000",
          "tags": [
            "pattern match",
            "ascii text",
            "file",
            "jpeg image",
            "exif standard",
            "tiff image",
            "png image",
            "united",
            "baseline",
            "rgba",
            "date",
            "class",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "error",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "botnet command",
            "control server",
            "noname057",
            "facebook",
            "phishtank",
            "blacklist http",
            "organization",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "n64xtx0vpihxzc",
            "whois whois",
            "qpyrn6pd http",
            "referrer",
            "execution",
            "communicating",
            "core",
            "discord",
            "hiddentear",
            "metro",
            "probe",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bleachgap",
            "formbook",
            "nanocore",
            "roblox",
            "heur",
            "cyber threat",
            "engineering",
            "malware",
            "phishing",
            "malicious site",
            "phishing site",
            "covid19",
            "team",
            "bank",
            "cobalt strike",
            "artemis",
            "download",
            "zbot",
            "suppobox",
            "service",
            "downloader",
            "virut",
            "malicious",
            "emotet",
            "stealer",
            "exploit",
            "generic",
            "dropper",
            "unruy",
            "agent",
            "unsafe",
            "ramnit",
            "redline stealer",
            "smsspy",
            "bradesco",
            "fakealert",
            "qakbot",
            "outbreak",
            "qbot",
            "bankerx",
            "riskware",
            "nimda",
            "swrort",
            "adwind",
            "trojanx",
            "crack",
            "win64",
            "squirrelwaffle",
            "pony",
            "binder",
            "virustotal",
            "azorult",
            "zeus",
            "nymaim",
            "matsnu",
            "simda",
            "runescape",
            "cutwail",
            "dnspionage",
            "redirector",
            "fusioncore",
            "iframe",
            "killav",
            "raccoon",
            "daum",
            "installcore",
            "ransomware",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "presenoker",
            "downldr",
            "alexa",
            "applicunwnt",
            "opencandy",
            "cleaner",
            "wacatac",
            "xrat",
            "xtrat",
            "dbatloader",
            "infy",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "phish",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "qpyrn6pd",
            "spyware",
            "injector",
            "jul jan",
            "tag count",
            "tue jan",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/d4e0619008da0bf555fd1d9af2797eaed02c89512239cbdaf64c08e795bb9658",
            "http://www.jamesbgriffinlaw.com/wp-content/plugins/formcraft/file-upload/server/content/files/16132c66b562a3---dewubomojagorekijufuruni [ Malicious Plugins]",
            "*otc.greatcall.com    [Botnetwork]",
            "https://www.norad.mil/ [ Modified by others| Parking Crew - is a Tracker]",
            "https://otx.alienvault.com/indicator/url/http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Malware Server | iTunes path hacktool]",
            "tulach.cc.     [Malevolent | Modified description]",
            "https://tulach.cc/ [phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ ELF - Descriptions modified by others]",
            "https://www.pornhub.com/video/search?search=tsara+brashears [NORAD.mil phone tracking. Description modified]",
            "s3.amazonaws.com   [Virut Tsara Brashears Botnetwork | Modified description]"
          ],
          "public": 1,
          "adversary": "Qbot",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 897,
            "FileHash-SHA1": 479,
            "URL": 9847,
            "domain": 2344,
            "hostname": 2398,
            "CVE": 22,
            "FileHash-SHA256": 4712
          },
          "indicator_count": 20699,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "848 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655f6d7ac217661e4bc37f4d",
          "name": "Qbot | Miscellaneous Attacks",
          "description": "The following is a full list of links between malware and cyber-attackers, following a series of alerts from Phishtank, the UK-based cyber security firm, and the US government.",
          "modified": "2023-12-23T07:03:55.171000",
          "created": "2023-11-23T15:19:22.356000",
          "tags": [
            "pattern match",
            "ascii text",
            "file",
            "jpeg image",
            "exif standard",
            "tiff image",
            "png image",
            "united",
            "baseline",
            "rgba",
            "date",
            "class",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "error",
            "firehol",
            "detection list",
            "ip address",
            "blacklist",
            "botnet command",
            "control server",
            "noname057",
            "facebook",
            "phishtank",
            "blacklist http",
            "organization",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "n64xtx0vpihxzc",
            "whois whois",
            "qpyrn6pd http",
            "referrer",
            "execution",
            "communicating",
            "core",
            "discord",
            "hiddentear",
            "metro",
            "probe",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bleachgap",
            "formbook",
            "nanocore",
            "roblox",
            "heur",
            "cyber threat",
            "engineering",
            "malware",
            "phishing",
            "malicious site",
            "phishing site",
            "covid19",
            "team",
            "bank",
            "cobalt strike",
            "artemis",
            "download",
            "zbot",
            "suppobox",
            "service",
            "downloader",
            "virut",
            "malicious",
            "emotet",
            "stealer",
            "exploit",
            "generic",
            "dropper",
            "unruy",
            "agent",
            "unsafe",
            "ramnit",
            "redline stealer",
            "smsspy",
            "bradesco",
            "fakealert",
            "qakbot",
            "outbreak",
            "qbot",
            "bankerx",
            "riskware",
            "nimda",
            "swrort",
            "adwind",
            "trojanx",
            "crack",
            "win64",
            "squirrelwaffle",
            "pony",
            "binder",
            "virustotal",
            "azorult",
            "zeus",
            "nymaim",
            "matsnu",
            "simda",
            "runescape",
            "cutwail",
            "dnspionage",
            "redirector",
            "fusioncore",
            "iframe",
            "killav",
            "raccoon",
            "daum",
            "installcore",
            "ransomware",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "presenoker",
            "downldr",
            "alexa",
            "applicunwnt",
            "opencandy",
            "cleaner",
            "wacatac",
            "xrat",
            "xtrat",
            "dbatloader",
            "infy",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "phish",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "qpyrn6pd",
            "spyware",
            "injector",
            "jul jan",
            "tag count",
            "tue jan",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/d4e0619008da0bf555fd1d9af2797eaed02c89512239cbdaf64c08e795bb9658",
            "http://www.jamesbgriffinlaw.com/wp-content/plugins/formcraft/file-upload/server/content/files/16132c66b562a3---dewubomojagorekijufuruni [ Malicious Plugins]",
            "*otc.greatcall.com    [Botnetwork]",
            "https://www.norad.mil/ [ Modified by others| Parking Crew - is a Tracker]",
            "https://otx.alienvault.com/indicator/url/http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Malware Server | iTunes path hacktool]",
            "tulach.cc.     [Malevolent | Modified description]",
            "https://tulach.cc/ [phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ ELF - Descriptions modified by others]",
            "https://www.pornhub.com/video/search?search=tsara+brashears [NORAD.mil phone tracking. Description modified]",
            "s3.amazonaws.com   [Virut Tsara Brashears Botnetwork | Modified description]"
          ],
          "public": 1,
          "adversary": "Qbot",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 897,
            "FileHash-SHA1": 479,
            "URL": 9847,
            "domain": 2344,
            "hostname": 2398,
            "CVE": 22,
            "FileHash-SHA256": 4712
          },
          "indicator_count": 20699,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "848 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a947431aca6a0666c11b4",
          "name": " RedlineStealer | tx-p2p-pull.video-voip.com.dorm.com",
          "description": "",
          "modified": "2023-12-22T15:02:57.858000",
          "created": "2023-12-02T02:20:36.922000",
          "tags": [
            "ssl certificate",
            "execution",
            "historical ssl",
            "dropped",
            "whois record",
            "whois",
            "referrer",
            "contacted",
            "best",
            "sites",
            "emotet",
            "team",
            "cyber threat",
            "united",
            "engineering",
            "malware",
            "hostname",
            "malicious site",
            "heur",
            "phishing",
            "phishing site",
            "suppobox",
            "facebook",
            "zbot",
            "malicious",
            "download",
            "redline stealer",
            "simda",
            "bank",
            "virut",
            "tofsee",
            "vawtrak",
            "hotmail",
            "steam",
            "nymaim",
            "zeus",
            "installcore",
            "ransomware",
            "ramnit",
            "union",
            "kraken",
            "pony",
            "betabot",
            "unruy",
            "bandoo",
            "matsnu",
            "detection list",
            "blacklist",
            "noname057",
            "stop",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "ascii text",
            "mitre att",
            "ck id",
            "show technique",
            "date",
            "unknown",
            "meta",
            "generator",
            "critical",
            "error",
            "body",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "cisco umbrella",
            "site",
            "safe site",
            "html",
            "million",
            "alexa top",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "riskware",
            "webshell",
            "exploit",
            "crack",
            "azorult",
            "service",
            "runescape",
            "ip address",
            "mail spammer",
            "attacker",
            "et cins",
            "active threat",
            "reputation ip",
            "threats et",
            "dns replication",
            "graph summary",
            "domain status",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "ALF:Cert:Bandoo",
              "display_name": "ALF:Cert:Bandoo",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "AdaptiveBee",
              "display_name": "AdaptiveBee",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Swrort",
              "display_name": "Swrort",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "655e3debccfb06fb9580b69d",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 72,
            "FileHash-SHA256": 2087,
            "URL": 6558,
            "domain": 1279,
            "hostname": 2371,
            "CVE": 14,
            "email": 1
          },
          "indicator_count": 12483,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655e3debccfb06fb9580b69d",
          "name": "RedlineStealer | tx-p2p-pull.video-voip.com.dorm.com",
          "description": "tx-p2p-pull.video-voip.com.dorm.com",
          "modified": "2023-12-22T15:02:57.858000",
          "created": "2023-11-22T17:44:11.982000",
          "tags": [
            "ssl certificate",
            "execution",
            "historical ssl",
            "dropped",
            "whois record",
            "whois",
            "referrer",
            "contacted",
            "best",
            "sites",
            "emotet",
            "team",
            "cyber threat",
            "united",
            "engineering",
            "malware",
            "hostname",
            "malicious site",
            "heur",
            "phishing",
            "phishing site",
            "suppobox",
            "facebook",
            "zbot",
            "malicious",
            "download",
            "redline stealer",
            "simda",
            "bank",
            "virut",
            "tofsee",
            "vawtrak",
            "hotmail",
            "steam",
            "nymaim",
            "zeus",
            "installcore",
            "ransomware",
            "ramnit",
            "union",
            "kraken",
            "pony",
            "betabot",
            "unruy",
            "bandoo",
            "matsnu",
            "detection list",
            "blacklist",
            "noname057",
            "stop",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "ascii text",
            "mitre att",
            "ck id",
            "show technique",
            "date",
            "unknown",
            "meta",
            "generator",
            "critical",
            "error",
            "body",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "cisco umbrella",
            "site",
            "safe site",
            "html",
            "million",
            "alexa top",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "riskware",
            "webshell",
            "exploit",
            "crack",
            "azorult",
            "service",
            "runescape",
            "ip address",
            "mail spammer",
            "attacker",
            "et cins",
            "active threat",
            "reputation ip",
            "threats et",
            "dns replication",
            "graph summary",
            "domain status",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "ALF:Cert:Bandoo",
              "display_name": "ALF:Cert:Bandoo",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "AdaptiveBee",
              "display_name": "AdaptiveBee",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Swrort",
              "display_name": "Swrort",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 72,
            "FileHash-SHA256": 2087,
            "URL": 6558,
            "domain": 1279,
            "hostname": 2371,
            "CVE": 14,
            "email": 1
          },
          "indicator_count": 12483,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655e3de9eb518e46e96e9fd4",
          "name": "RedlineStealer | tx-p2p-pull.video-voip.com.dorm.com",
          "description": "tx-p2p-pull.video-voip.com.dorm.com",
          "modified": "2023-12-22T15:02:57.858000",
          "created": "2023-11-22T17:44:09.675000",
          "tags": [
            "ssl certificate",
            "execution",
            "historical ssl",
            "dropped",
            "whois record",
            "whois",
            "referrer",
            "contacted",
            "best",
            "sites",
            "emotet",
            "team",
            "cyber threat",
            "united",
            "engineering",
            "malware",
            "hostname",
            "malicious site",
            "heur",
            "phishing",
            "phishing site",
            "suppobox",
            "facebook",
            "zbot",
            "malicious",
            "download",
            "redline stealer",
            "simda",
            "bank",
            "virut",
            "tofsee",
            "vawtrak",
            "hotmail",
            "steam",
            "nymaim",
            "zeus",
            "installcore",
            "ransomware",
            "ramnit",
            "union",
            "kraken",
            "pony",
            "betabot",
            "unruy",
            "bandoo",
            "matsnu",
            "detection list",
            "blacklist",
            "noname057",
            "stop",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "ascii text",
            "mitre att",
            "ck id",
            "show technique",
            "date",
            "unknown",
            "meta",
            "generator",
            "critical",
            "error",
            "body",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "cisco umbrella",
            "site",
            "safe site",
            "html",
            "million",
            "alexa top",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "riskware",
            "webshell",
            "exploit",
            "crack",
            "azorult",
            "service",
            "runescape",
            "ip address",
            "mail spammer",
            "attacker",
            "et cins",
            "active threat",
            "reputation ip",
            "threats et",
            "dns replication",
            "graph summary",
            "domain status",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "Kraken",
              "display_name": "Kraken",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Matsnu",
              "display_name": "Matsnu",
              "target": null
            },
            {
              "id": "BetaBot",
              "display_name": "BetaBot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "ALF:Cert:Bandoo",
              "display_name": "ALF:Cert:Bandoo",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "AdaptiveBee",
              "display_name": "AdaptiveBee",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Swrort",
              "display_name": "Swrort",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 49,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 72,
            "FileHash-SHA256": 2087,
            "URL": 6558,
            "domain": 1279,
            "hostname": 2371,
            "CVE": 14,
            "email": 1
          },
          "indicator_count": 12483,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655af45af3f5879500aeed76",
          "name": "Immortal | http://apple.huzii.cn/",
          "description": "",
          "modified": "2023-12-19T23:04:48.178000",
          "created": "2023-11-20T05:53:30.948000",
          "tags": [
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "ip address",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "server",
            "connection",
            "html info",
            "title",
            "meta tags",
            "communicating",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "spyware",
            "injector",
            "blacklist http",
            "malicious url",
            "team",
            "simda",
            "bambernek",
            "cisco umbrella",
            "site",
            "bambernek gen",
            "safe site",
            "malware site",
            "malicious site",
            "alexa top",
            "installcore",
            "malware",
            "infy",
            "quasar rat",
            "inmortal",
            "cyber threat",
            "united",
            "team phishing",
            "maltiverse",
            "engineering",
            "mail spammer",
            "attacker",
            "hostname",
            "phishing",
            "redline stealer",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "agent",
            "service",
            "malicious",
            "bank",
            "pykspa",
            "vawtrak",
            "suppobox",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "temp",
            "ck id",
            "show technique",
            "unknown",
            "date",
            "span",
            "error",
            "refresh",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "restart"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655a98cc8cb36e3ed3a67530",
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9403,
            "FileHash-MD5": 496,
            "FileHash-SHA256": 3115,
            "domain": 1429,
            "hostname": 1888,
            "FileHash-SHA1": 271,
            "CVE": 2
          },
          "indicator_count": 16604,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655a99cf0e5551be4af47124",
          "name": "Immortal ",
          "description": "",
          "modified": "2023-12-19T23:04:48.178000",
          "created": "2023-11-19T23:27:11.676000",
          "tags": [
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "ip address",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "server",
            "connection",
            "html info",
            "title",
            "meta tags",
            "communicating",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "spyware",
            "injector",
            "blacklist http",
            "malicious url",
            "team",
            "simda",
            "bambernek",
            "cisco umbrella",
            "site",
            "bambernek gen",
            "safe site",
            "malware site",
            "malicious site",
            "alexa top",
            "installcore",
            "malware",
            "infy",
            "quasar rat",
            "inmortal",
            "cyber threat",
            "united",
            "team phishing",
            "maltiverse",
            "engineering",
            "mail spammer",
            "attacker",
            "hostname",
            "phishing",
            "redline stealer",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "agent",
            "service",
            "malicious",
            "bank",
            "pykspa",
            "vawtrak",
            "suppobox",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "temp",
            "ck id",
            "show technique",
            "unknown",
            "date",
            "span",
            "error",
            "refresh",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "restart"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655a98cc8cb36e3ed3a67530",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10109,
            "FileHash-MD5": 554,
            "FileHash-SHA256": 3593,
            "domain": 1555,
            "hostname": 2180,
            "FileHash-SHA1": 295,
            "CVE": 22
          },
          "indicator_count": 18308,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655a98cc8cb36e3ed3a67530",
          "name": "http://apple.huzii.cn/",
          "description": "",
          "modified": "2023-12-19T23:04:48.178000",
          "created": "2023-11-19T23:22:52.263000",
          "tags": [
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "ip address",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "server",
            "connection",
            "html info",
            "title",
            "meta tags",
            "communicating",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "spyware",
            "injector",
            "blacklist http",
            "malicious url",
            "team",
            "simda",
            "bambernek",
            "cisco umbrella",
            "site",
            "bambernek gen",
            "safe site",
            "malware site",
            "malicious site",
            "alexa top",
            "installcore",
            "malware",
            "infy",
            "quasar rat",
            "inmortal",
            "cyber threat",
            "united",
            "team phishing",
            "maltiverse",
            "engineering",
            "mail spammer",
            "attacker",
            "hostname",
            "phishing",
            "redline stealer",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "agent",
            "service",
            "malicious",
            "bank",
            "pykspa",
            "vawtrak",
            "suppobox",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "temp",
            "ck id",
            "show technique",
            "unknown",
            "date",
            "span",
            "error",
            "refresh",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "restart"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9403,
            "FileHash-MD5": 496,
            "FileHash-SHA256": 3115,
            "domain": 1429,
            "hostname": 1888,
            "FileHash-SHA1": 271,
            "CVE": 2
          },
          "indicator_count": 16604,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7b4eb565273001e2e08",
          "name": "Ireland Netsky | Relay Router | Misc Attack on LTL Fright Outage",
          "description": "",
          "modified": "2023-12-06T16:56:20.491000",
          "created": "2023-12-06T16:56:20.491000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1353,
            "CVE": 8,
            "FileHash-SHA256": 3611,
            "domain": 795,
            "URL": 2831,
            "FileHash-MD5": 663,
            "FileHash-SHA1": 398
          },
          "indicator_count": 9659,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "651cd4a6af63714f51c8d721",
          "name": "Ireland Netsky | Relay Router | Misc Attack on LTL Fright Outage",
          "description": "Cobalt Strike , FireHol anonymization,  IT Attack, Suricata Alert, MITRE. Appears to be a complete cyber attack against a well known LTL Fright lines IT system.",
          "modified": "2023-11-03T02:03:00.398000",
          "created": "2023-10-04T02:57:42.183000",
          "tags": [
            "united",
            "smtp service",
            "firehol",
            "pony",
            "s1us",
            "s1de",
            "spammer",
            "proxy",
            "ireland netsky",
            "anonymizer",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "alexa top",
            "alexa",
            "detection list",
            "blacklist",
            "malicious url",
            "blacklist http",
            "linkid252669",
            "noname057",
            "url summary",
            "summary",
            "sample",
            "samples",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc activity",
            "et policy",
            "tor ssl",
            "Hostname: RecoveryStore-3.7.5.1.4.6.2.0-D917-11E7-B67B-080027A49",
            "cyber criminal",
            "FireHOL",
            "Suricata Alert",
            "HTML document, ASCII text",
            "mail spammer",
            "malware site",
            "heur",
            "malware",
            "adware",
            "malicious site",
            "phishing site",
            "artemis",
            "unsafe",
            "exploit",
            "iframe",
            "fakealert",
            "opencandy",
            "riskware",
            "genkryptik",
            "nircmd",
            "swrort",
            "downldr",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "coinminer",
            "dropper",
            "cobalt strike",
            "acint",
            "systweak",
            "behav",
            "agent",
            "phishing",
            "maltiverse",
            "trojanspy",
            "webtoolbar",
            "phishing",
            "exploit-source"
          ],
          "references": [
            "-Hostname: RecoveryStore-3.7.5.1.4.6.2.0-D917-11E7-B67B-080027A49DD/",
            "https://www.hybrid-analysis.com/sample/fa1f15bd4c0cd287fe04f324d3363a8b5a295b57cb22d9ea0f3d6973eb442d17/651c94c00b17fb9324040f7c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Ireland Netsky",
              "display_name": "Ireland Netsky",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [
            "Transportation",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 795,
            "FileHash-MD5": 663,
            "hostname": 1353,
            "URL": 2831,
            "FileHash-SHA1": 398,
            "FileHash-SHA256": 3611,
            "CVE": 8
          },
          "indicator_count": 9659,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "898 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1a8f35a050560dcd3b00",
          "name": "Ireland Netsky | Relay Router | Misc Attack on LTL Fright Outage",
          "description": "",
          "modified": "2023-11-03T02:03:00.398000",
          "created": "2023-10-30T02:53:03.811000",
          "tags": [
            "united",
            "smtp service",
            "firehol",
            "pony",
            "s1us",
            "s1de",
            "spammer",
            "proxy",
            "ireland netsky",
            "anonymizer",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "alexa top",
            "alexa",
            "detection list",
            "blacklist",
            "malicious url",
            "blacklist http",
            "linkid252669",
            "noname057",
            "url summary",
            "summary",
            "sample",
            "samples",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc activity",
            "et policy",
            "tor ssl",
            "Hostname: RecoveryStore-3.7.5.1.4.6.2.0-D917-11E7-B67B-080027A49",
            "cyber criminal",
            "FireHOL",
            "Suricata Alert",
            "HTML document, ASCII text",
            "mail spammer",
            "malware site",
            "heur",
            "malware",
            "adware",
            "malicious site",
            "phishing site",
            "artemis",
            "unsafe",
            "exploit",
            "iframe",
            "fakealert",
            "opencandy",
            "riskware",
            "genkryptik",
            "nircmd",
            "swrort",
            "downldr",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "coinminer",
            "dropper",
            "cobalt strike",
            "acint",
            "systweak",
            "behav",
            "agent",
            "phishing",
            "maltiverse",
            "trojanspy",
            "webtoolbar",
            "phishing",
            "exploit-source"
          ],
          "references": [
            "-Hostname: RecoveryStore-3.7.5.1.4.6.2.0-D917-11E7-B67B-080027A49DD/",
            "https://www.hybrid-analysis.com/sample/fa1f15bd4c0cd287fe04f324d3363a8b5a295b57cb22d9ea0f3d6973eb442d17/651c94c00b17fb9324040f7c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Ireland Netsky",
              "display_name": "Ireland Netsky",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [
            "Transportation",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": "651cd4a6af63714f51c8d721",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 795,
            "FileHash-MD5": 663,
            "hostname": 1353,
            "URL": 2831,
            "FileHash-SHA1": 398,
            "FileHash-SHA256": 3611,
            "CVE": 8
          },
          "indicator_count": 9659,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "898 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.gov.pl/attachment/65dfce94-31f9-4523-8d3b-89df3d4c5f75",
        "I unintentionally made the first pulse Public.",
        "Eternal Blue Wannacry \u2022 WannaCry Crypter",
        "https://tulach.cc/ [phishing]",
        "-Hostname: RecoveryStore-3.7.5.1.4.6.2.0-D917-11E7-B67B-080027A49DD/",
        "http://114.114.114.114:90/p/cdbdd4a09a64909694281aec503746fd/mobile_index.html?MTE0LjExNC4xMTQuMTE0L2xvZ2luP2hhc19vcmlfdXJp [Tulach | Malicious]",
        "Stalker/Lurker?http://myundeadneighbor.com | Parking Crews | Parklogic",
        "https://networkpccontrol.com/video-player-1/?clickid=4030fe2twwhgxaa9&domain=standardtrackerchain.com&uclick=e2twwhgx&uclickhash=e2twwhgx-e2twwhgx-xoq53y-0-3zvc3y-oj1m9r-oj1m1n-5da44a",
        "https://www.reddit.com/user [honeypot]",
        "https://www.hybrid-analysis.com/sample/347314196559e7fbc75fc532daa774727b897d3a2156ea1328861f3b66f677a5/656146284d68f73e2306b6ad",
        "s3.amazonaws.com   [Virut Tsara Brashears Botnetwork | Modified description]",
        "https://id.security.trackid",
        "tulach.cc.     [Malevolent | Modified description]",
        "https://hybrid-analysis.com/sample/8ed6c58fb2a5d50252bf106d31ed9e230925124443e4243bec9515c82ef0450c/68ddc351e27cb562e902d674",
        "gadyniw.com          [command_and_control]",
        "beacons.bcp.gvt.com   [tracking]",
        "www.norad.mil   [tracking]",
        "puzylyp.com           [command_and_control]",
        "www.apple.com  [API property call]",
        "https://tulach.cc/  [Botnet phishing]",
        "gahyqah.com          [command_and_control]",
        "galyqaz.com            [command_and_control]",
        "https://www.norad.mil/   [tracking]",
        "https://id.security.trackid.piwikb7c1867dd7ba9c57.2ce7e2c4000f72e3204af57fac31aafd.mailingmarketing.net/",
        "https://www.pornhub.com/video/search?search=tsara+brashears [NORAD.mil phone tracking. Description modified]",
        "198.54.115.46            [exploit_source]",
        "https://www.hybrid-analysis.com/sample/d4e0619008da0bf555fd1d9af2797eaed02c89512239cbdaf64c08e795bb9658",
        "yesporn.fun",
        "114.114.114.114  [Tulach | Virus Network IP]",
        "mortis.com",
        "https://www.apple.com/qtactivex/qtplugin.cab   [https://www.icloud.com .cab]",
        "https://www.reddit.com/user",
        "https://otx.alienvault.com/indicator/url/http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Malware Server | iTunes path hacktool]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ ELF - Descriptions modified by others]",
        "https://id.login.update.ssl.encryption-6159368de39251d7a-login.id.security.trackid.piwikb7c1867dd7ba9c57.e988d676bdb63f3b4dbcdc53578a9b26.mailingmarketing.net/",
        "*otc.greatcall.com    [Botnetwork]",
        "assassinationmarkets.com",
        "malicious.high.ml   [dropper]",
        "https://www.hybrid-analysis.com/sample/fa1f15bd4c0cd287fe04f324d3363a8b5a295b57cb22d9ea0f3d6973eb442d17/651c94c00b17fb9324040f7c",
        "https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45/65609b66e63f64cae305c749",
        "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
        "https://seedbeej.pk/tin/index.php?QBOT.zip",
        "https://tulach.cc/ [phishing, exploits, malware spreader]",
        "www.forensickb.com \u2022 Computer Forensics, Malware Analysis & Digital Investigations",
        "lyvyxor.com             [command_and_control]",
        "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
        "http://dev.findatoyota.com/",
        "http://www.jamesbgriffinlaw.com/wp-content/plugins/formcraft/file-upload/server/content/files/16132c66b562a3---dewubomojagorekijufuruni [ Malicious Plugins]",
        "Hmm, cyber criminals use parking pages for malvertizing malicious content & intent  , reputation content, etc",
        "https://seedbeej.pk/tin/index.php?QBOT.zip.  [Qbot zip]",
        "https://www.norad.mil/ [ Modified by others| Parking Crew - is a Tracker]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Qbot"
          ],
          "malware_families": [
            "Hidelink",
            "Hydra",
            "Dexter",
            "Wannacrypt",
            "Artemis",
            "Grandcrab",
            "Emotet",
            "Hacktool",
            "Backdoor:win32/tofsee.t",
            "Simda",
            "Betabot",
            "Kimsuky",
            "Installcore",
            "Spitmo",
            "Nymaim",
            "Matsnu",
            "Wannacry",
            "Suppobox",
            "Hawkeye",
            "Cobalt strike",
            "Vawtrak",
            "Alf:cert:bandoo",
            "Virut",
            "Sality",
            "Downloader.cerber/js!1.a59c (classic)",
            "Azorult",
            "Milesmx",
            "Andromeda",
            "Ransomware",
            "Verified",
            "Solar",
            "Ireland netsky",
            "Plasma rat",
            "Maltiverse",
            "Trojanx",
            "Athena",
            "Trojan:win32/emotet.pc!mtb",
            "Spyeye",
            "Inmortal",
            "Covid19",
            "Tulach malware",
            "Tofsee",
            "Redline stealer",
            "Roblox",
            "W32/expiro.fam",
            "Trojan:win32/emotet.kds!mtb",
            "Pony",
            "Nsis",
            "Citadel",
            "Webtoolbar",
            "Ramnit",
            "Artro",
            "Win.malware.tofsee-6880878-0",
            "Gregory",
            "Kraken",
            "Slingshot",
            "Domains",
            "Win32:kryptik-pll",
            "Alinaos",
            "Qakbot",
            "Opencandy",
            "Bondat",
            "Xrat",
            "Skynet",
            "Vskimmer",
            "Pykspa",
            "Neutrino",
            "Mediamagnet",
            "Trojan:win32/tiggre",
            "Infy",
            "Goldfinder",
            "Sibot - s0589",
            "Trojanspy",
            "Adaptivebee",
            "Et",
            "Ascii",
            "Pinkslipbot",
            "Swrort",
            "Unruy",
            "Bambernek",
            "Quasar",
            "Dorkbot",
            "Iobit",
            "Zeus",
            "Cutwail",
            "Zbot",
            "Tulach",
            "Eternal blue"
          ],
          "industries": [
            "Telecommunications",
            "Finance",
            "Transportation",
            "Technology",
            "Government",
            "Healthcare",
            "Insurance"
          ],
          "unique_indicators": 123924
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/gacyhis.com",
    "whois": "http://whois.domaintools.com/gacyhis.com",
    "domain": "gacyhis.com",
    "hostname": "www.gacyhis.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 24,
  "pulses": [
    {
      "id": "68ec0870475174302c733fa2",
      "name": "Cyber Crime - Emotet | Tofsee CnC | Targeting \u2022  Streaming \u2022 Stealing",
      "description": "I\u2019ve heard of mortis.com from a target. It was heavily suggested on targets YouTube homepage. I hadn\u2019t had thought to research link until Friday.\n\n Doing my due diligence I\u2019ve been viewing potential issues targets family member/s may be and his having with technology.\n\nSmart TV is completely hacked. playlist tampering , heavy downloading daily  when TV is on , off or unplugged. \n I watched this TV monitored data volume , noted    continued suggestions for Mortis.com , \ntouted  . Obviously, a threat. YouTuber warns not go in and no one can get in which is insanely stupid.  OTX issues,. Several pulse attempts later ,  constant refreshing and deleting of IoC this is all what remains. Streaming services, webcams and multiple labeled rooms. I have no idea the point of  death threats especially since God can mow anyone down. Who promised you another breath? Target seems to be  the only person targeted. Multiple Foundry , PayPal  Palantir\nLinks , Boeing, JetBlue Twitter , Apple loading issues.",
      "modified": "2025-11-11T04:02:27.091000",
      "created": "2025-10-12T19:58:40.472000",
      "tags": [
        "url https",
        "indicator role",
        "active related",
        "united",
        "ip address",
        "unknown ns",
        "x82xd4",
        "x86xd3",
        "xa1xf1",
        "xe8xc2x14",
        "win32tofsee",
        "trojan",
        "win32tofsee att",
        "ck ids",
        "t1096",
        "ntfs file",
        "service",
        "united kingdom",
        "germany",
        "netherlands",
        "mortis.com",
        "dead",
        "death",
        "foundry",
        "paypal",
        "home visitor",
        "psalms 37",
        "trojan",
        "emotet",
        "boeing",
        "apple",
        "streaming",
        "kryptik",
        "myundeadneighbor",
        "windstream communications llc",
        "command",
        "tofsee",
        "kx81xdbx0f",
        "wx99xcdx11",
        "stream",
        "write",
        "malware",
        "tsara brashears",
        "regsetvalueexa",
        "malware",
        "win32",
        "persistence",
        "execution",
        "push",
        "shellexecuteexw",
        "windows",
        "botnet",
        "backdoor",
        "writeconsolew",
        "displayname",
        "sddl",
        "hash",
        "ip address",
        "ssl certificate",
        "spawns",
        "initial access",
        "adversaries",
        "name tactics",
        "t1031",
        "registry",
        "dock",
        "suspicious",
        "learn",
        "phishing att",
        "infection",
        "commandand_and_control",
        "informative",
        "jetblue",
        "porn",
        "keylogger",
        "remote keylogger",
        "parklogic",
        "parking crew",
        "park pages",
        "cyber crime",
        "data brokers",
        "info stealers",
        "password",
        "masquerading",
        "discord",
        "sophisticated",
        "dga domains",
        "pit",
        "rotor",
        "hello",
        "targeting",
        "games"
      ],
      "references": [
        "mortis.com",
        "I unintentionally made the first pulse Public.",
        "Stalker/Lurker?http://myundeadneighbor.com | Parking Crews | Parklogic",
        "assassinationmarkets.com",
        "https://id.security.trackid",
        "https://id.security.trackid.piwikb7c1867dd7ba9c57.2ce7e2c4000f72e3204af57fac31aafd.mailingmarketing.net/",
        "https://id.login.update.ssl.encryption-6159368de39251d7a-login.id.security.trackid.piwikb7c1867dd7ba9c57.e988d676bdb63f3b4dbcdc53578a9b26.mailingmarketing.net/",
        "Hmm, cyber criminals use parking pages for malvertizing malicious content & intent  , reputation content, etc",
        "https://www.gov.pl/attachment/65dfce94-31f9-4523-8d3b-89df3d4c5f75"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Emotet.PC!MTB",
          "display_name": "Trojan:Win32/Emotet.PC!MTB",
          "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
        },
        {
          "id": "Trojan:Win32/Emotet.KDS!MTB",
          "display_name": "Trojan:Win32/Emotet.KDS!MTB",
          "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Malware.Tofsee-6880878-0",
          "display_name": "Win.Malware.Tofsee-6880878-0",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win32:Kryptik-PLL",
          "display_name": "Win32:Kryptik-PLL",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2407,
        "domain": 2321,
        "hostname": 983,
        "FileHash-SHA256": 3035,
        "FileHash-MD5": 228,
        "FileHash-SHA1": 231,
        "email": 1,
        "FilePath": 3
      },
      "indicator_count": 9209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "159 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68ddc9048ba0719321307d03",
      "name": "Malicious Probe - WannaCry \u2022 WannaCrypt- Ransomware",
      "description": "Malicious remote cab / drive by via an alt google redirect , clicked image , suspicious, low amount of search results.\nRead coded image. Target/s phone -cnc and infected. #dead_connect #decrypted #hacked #nametactics",
      "modified": "2025-11-01T00:02:59.726000",
      "created": "2025-10-02T00:36:20.247000",
      "tags": [
        "ip address",
        "key identifier",
        "x509v3 subject",
        "data",
        "v3 serial",
        "cus ogoogle",
        "trust",
        "cnwr3 validity",
        "subject public",
        "key info",
        "links",
        "dynamicloader",
        "high",
        "et exploit",
        "ms17010",
        "msf style",
        "probe ms17010",
        "generic flags",
        "dns lookup",
        "ransom",
        "write",
        "malware",
        "wannacrypt",
        "wannacry",
        "eternal blue",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "development att",
        "ssl certificate",
        "programfiles",
        "username",
        "windir",
        "userprofile",
        "mitre att",
        "ck matrix",
        "localappdata",
        "comspec",
        "model",
        "hybrid",
        "path",
        "click",
        "strings",
        "sabey type",
        "quasi type",
        "pegasus relationship",
        "fbi? files"
      ],
      "references": [
        "www.forensickb.com \u2022 Computer Forensics, Malware Analysis & Digital Investigations",
        "Eternal Blue Wannacry \u2022 WannaCry Crypter",
        "https://hybrid-analysis.com/sample/8ed6c58fb2a5d50252bf106d31ed9e230925124443e4243bec9515c82ef0450c/68ddc351e27cb562e902d674"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCrypt",
          "display_name": "WannaCrypt",
          "target": null
        },
        {
          "id": "Eternal Blue",
          "display_name": "Eternal Blue",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4246,
        "domain": 757,
        "hostname": 1039,
        "email": 1,
        "FileHash-SHA256": 2738,
        "FileHash-SHA1": 152,
        "FileHash-MD5": 140,
        "CVE": 1,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 9077,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "169 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68ddc902283b04c489f7e1cd",
      "name": "Malicious Probe - WannaCry \u2022 WannaCrypt- Ransomware",
      "description": "Malicious remote cab / drive by via an alt google redirect , clicked image , suspicious, low amount of search results.\nRead coded image. Target/s phone -cnc and infected. #dead_connect #decrypted #hacked #nametactics",
      "modified": "2025-11-01T00:02:59.726000",
      "created": "2025-10-02T00:36:18.296000",
      "tags": [
        "ip address",
        "key identifier",
        "x509v3 subject",
        "data",
        "v3 serial",
        "cus ogoogle",
        "trust",
        "cnwr3 validity",
        "subject public",
        "key info",
        "links",
        "dynamicloader",
        "high",
        "et exploit",
        "ms17010",
        "msf style",
        "probe ms17010",
        "generic flags",
        "dns lookup",
        "ransom",
        "write",
        "malware",
        "wannacrypt",
        "wannacry",
        "eternal blue",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "development att",
        "ssl certificate",
        "programfiles",
        "username",
        "windir",
        "userprofile",
        "mitre att",
        "ck matrix",
        "localappdata",
        "comspec",
        "model",
        "hybrid",
        "path",
        "click",
        "strings",
        "sabey type",
        "quasi type",
        "pegasus relationship",
        "fbi? files"
      ],
      "references": [
        "www.forensickb.com \u2022 Computer Forensics, Malware Analysis & Digital Investigations",
        "Eternal Blue Wannacry \u2022 WannaCry Crypter",
        "https://hybrid-analysis.com/sample/8ed6c58fb2a5d50252bf106d31ed9e230925124443e4243bec9515c82ef0450c/68ddc351e27cb562e902d674"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCrypt",
          "display_name": "WannaCrypt",
          "target": null
        },
        {
          "id": "Eternal Blue",
          "display_name": "Eternal Blue",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4246,
        "domain": 757,
        "hostname": 1039,
        "email": 1,
        "FileHash-SHA256": 2738,
        "FileHash-SHA1": 152,
        "FileHash-MD5": 140,
        "CVE": 1,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 9077,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "169 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "688c8526be7a4df33863b5c5",
      "name": "VirusTotal - Shiz.ivr",
      "description": "*Win.Trojan.Shiz.ivr\n*PWS:Win32/Simda.D\n*virtool #injection#infostealer #network #cnc #block_not #virustotal_google #cnc #checking #procmem_yara\n#injection_inter_process\n#injection_create_remote_thread\n#antidebug_windows\n#multiple_useragents\n#network_fake_useragent\n#persistence_autorun\n#cape_detected_threat\n#antiav_detectfile\n#modify_proxy\n#deletes_self\n#infostealer_cookies\n#injection_createremotethread\n#suricata_alert\n~ vashti",
      "modified": "2025-08-31T08:01:04.297000",
      "created": "2025-08-01T09:13:10.510000",
      "tags": [
        "dynamicloader",
        "unknown",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "suspicious",
        "search",
        "high",
        "show",
        "copy",
        "possible",
        "write",
        "internal",
        "malware",
        "push",
        "local",
        "next",
        "contacted",
        "domains",
        "pulses",
        "related tags",
        "file type",
        "date april",
        "pm size",
        "sha1 sha256",
        "imphash pehash",
        "virustotal api",
        "bq jul",
        "united",
        "trojan",
        "backdoor",
        "virtool",
        "cnc beacon",
        "entries",
        "path max",
        "passive dns",
        "next associated",
        "cookie",
        "twitter",
        "body",
        "date",
        "medium",
        "simda",
        "global"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10303,
        "hostname": 1413,
        "FileHash-SHA256": 1868,
        "domain": 1877,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 348,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 16168,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 145,
      "modified_text": "231 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a7e576b3cbdf2f86a32acc",
      "name": "Skynet | prd.connectforhealthco.com | Identity theft |",
      "description": "Remote interception of health insurance applicants call.  Social engineering - threat actor will walk target through process beginning with; verification of phone model, browser used, phone number, email, ssn# entered in staged health insurance enrollment application. Auto forwards ssn#  to Experian, locking consumer from of all accounts, credit information is stolen, consumer identity theft. New accounts cannot be created, a password reset is required for scam, all emails requested,  bad actor will ask for entire households email accounts, device use, etc.  Sends malicious forms to devices. Takes consumer through a lengthy phone transfer scheme  +++",
      "modified": "2024-02-16T13:04:46.804000",
      "created": "2024-01-17T14:34:30.204000",
      "tags": [
        "whois record",
        "historical ssl",
        "ssl certificate",
        "april",
        "referrer",
        "threat roundup",
        "communicating",
        "whois",
        "rwi dtools",
        "jekyll",
        "metro",
        "skynet",
        "identity theft",
        "parking crew",
        "whois whois",
        "resolutions",
        "october",
        "august",
        "march",
        "june",
        "attack",
        "goldfinder",
        "sibot",
        "hacktool",
        "remote attack",
        "social engineering",
        "read c",
        "get autoit",
        "search",
        "regsetvalueexa",
        "show",
        "entries",
        "regdword",
        "intel",
        "ms windows",
        "showing",
        "autoit",
        "write",
        "worm",
        "copy",
        "unknown",
        "win32",
        "persistence",
        "execution",
        "malware",
        "autorun",
        "redacted for",
        "for privacy",
        "name servers",
        "date",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "encrypt",
        "next",
        "sabey",
        "no expiration",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "iocs",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "malware beacon",
        "useragent",
        "http request",
        "hostile",
        "autoit windows",
        "automation tool",
        "forbidden",
        "algorithm",
        "full name",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "info",
        "first",
        "detections type",
        "name",
        "javascript",
        "pdf community",
        "office open",
        "xml spreadsheet",
        "text",
        "siblings",
        "process32nextw",
        "fjlsedauv",
        "writeconsolea",
        "medium",
        "discovery",
        "high",
        "module load",
        "t1129",
        "united",
        "as63949 linode",
        "mtb jan",
        "passive dns",
        "backdoor",
        "mtb dec",
        "open",
        "body",
        "artro",
        "creation date",
        "servers",
        "urls",
        "record value",
        "expiration date",
        "vt graph",
        "parent referrer",
        "apple private",
        "data collection",
        "hidden privacy",
        "malicious",
        "verified",
        "utc submissions",
        "submitters",
        "summary iocs",
        "graph community",
        "tucows",
        "amazonaes",
        "china telecom",
        "group",
        "cloudflarenet",
        "akamaias",
        "pty ltd",
        "argon data",
        "communication",
        "limited",
        "digitaloceanasn",
        "twitter",
        "dropbox",
        "domainsite",
        "alibaba cloud",
        "computing",
        "beijing",
        "service",
        "ip address",
        "latest",
        "virustotal",
        "unclejohn",
        "us autonomous",
        "system46606",
        "unified layer",
        "urls latest",
        "contacted",
        "historical",
        "subdomains",
        "gootloader",
        "http response",
        "final url",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "binary",
        "sameorigin",
        "scammer",
        "spammer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "Sibot - S0589",
          "display_name": "Sibot - S0589",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Verified",
          "display_name": "Verified",
          "target": null
        },
        {
          "id": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
          "display_name": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
          "target": null
        },
        {
          "id": "W32/Expiro.fam",
          "display_name": "W32/Expiro.fam",
          "target": null
        },
        {
          "id": "Kimsuky",
          "display_name": "Kimsuky",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1460",
          "name": "Biometric Spoofing",
          "display_name": "T1460 - Biometric Spoofing"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1184",
          "name": "SSH Hijacking",
          "display_name": "T1184 - SSH Hijacking"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1416",
          "name": "URI Hijacking",
          "display_name": "T1416 - URI Hijacking"
        }
      ],
      "industries": [
        "Healthcare",
        "Insurance",
        "Finance",
        "Technology",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 515,
        "FileHash-SHA1": 504,
        "FileHash-SHA256": 3557,
        "URL": 5450,
        "domain": 1842,
        "hostname": 2221,
        "CVE": 2,
        "email": 6
      },
      "indicator_count": 14097,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "793 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658449d3f6ec1af2f3aace46",
      "name": "Qakbot | Reddit",
      "description": "Qbot URL: https://seedbeej.pk/tin/index.php?QBOT.zip Qbot zip found in Reddit Honeypot link: https://www.reddit.com/user backdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork with many capabilities, attack methods and demands. An unsuspecting victim always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware  malvertizing, fraud services, leads to full control of badly compromised digital profile.",
      "modified": "2024-01-20T02:02:19.559000",
      "created": "2023-12-21T14:21:07.435000",
      "tags": [
        "ssl certificate",
        "iocs",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "search",
        "threat",
        "paste",
        "blacklist https",
        "qakbot",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "ascii text",
        "pattern match",
        "file",
        "windows nt",
        "appdata",
        "indicator",
        "crlf line",
        "unicode text",
        "jpeg image",
        "mitre att",
        "hybrid",
        "general",
        "local",
        "error",
        "click",
        "strings",
        "microsoft",
        "threat analyzer",
        "urls https",
        "no data",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "heur",
        "malware site",
        "malicious site",
        "safe site",
        "malware",
        "html",
        "phishing site",
        "site top",
        "riskware",
        "unsafe",
        "artemis",
        "quasar rat",
        "downldr",
        "agent",
        "presenoker",
        "applicunwnt",
        "crack",
        "cve201711882",
        "win64",
        "iframe",
        "quasar",
        "trojanspy",
        "exit",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "traffic",
        "anonymizer",
        "brasil",
        "phishing three",
        "united",
        "phishing bank",
        "virustotal",
        "tech",
        "bank",
        "maltiverse",
        "hidelink",
        "samples",
        "spyware",
        "injector",
        "mon jan",
        "tld count",
        "wed dec",
        "download",
        "first",
        "team",
        "simda",
        "bambernek",
        "simda simda",
        "infy",
        "alexa",
        "gregory",
        "cyber threat",
        "phishing",
        "engineering",
        "covid19",
        "telefonica co",
        "malicious",
        "zbot",
        "zeus",
        "betabot",
        "suppobox",
        "citadel",
        "pony",
        "kraken",
        "redline stealer",
        "ransomware",
        "vawtrak",
        "athena",
        "neutrino",
        "alina",
        "andromeda",
        "dexter",
        "unknown",
        "keylogger",
        "hawkeye",
        "phase",
        "jackpos",
        "plasma",
        "spyeye",
        "spitmo",
        "slingshot",
        "ramnit",
        "emotet",
        "pykspa",
        "virut",
        "installcore",
        "dorkbot",
        "bondat",
        "union",
        "vskimmer",
        "xtrat",
        "solar",
        "grandcrab",
        "nymaim",
        "matsnu",
        "cutwail",
        "cobalt strike",
        "hydra",
        "tinba",
        "nsis",
        "memscan",
        "deepscan",
        "runescape",
        "backdoor",
        "reddit",
        "tulach",
        "password stealer",
        "active threat",
        "apple",
        "pinkslipbot",
        "icloud",
        "free",
        "apple"
      ],
      "references": [
        "https://seedbeej.pk/tin/index.php?QBOT.zip.  [Qbot zip]",
        "https://tulach.cc/  [Botnet phishing]",
        "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
        "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
        "198.54.115.46            [exploit_source]",
        "gadyniw.com          [command_and_control]",
        "gahyqah.com          [command_and_control]",
        "galyqaz.com            [command_and_control]",
        "lyvyxor.com             [command_and_control]",
        "puzylyp.com           [command_and_control]",
        "malicious.high.ml   [dropper]",
        "https://www.reddit.com/user [honeypot]",
        "beacons.bcp.gvt.com   [tracking]",
        "https://www.norad.mil/   [tracking]",
        "www.norad.mil   [tracking]",
        "www.apple.com  [API property call]",
        "https://www.apple.com/qtactivex/qtplugin.cab   [https://www.icloud.com .cab]",
        "yesporn.fun",
        "http://114.114.114.114:90/p/cdbdd4a09a64909694281aec503746fd/mobile_index.html?MTE0LjExNC4xMTQuMTE0L2xvZ2luP2hhc19vcmlfdXJp [Tulach | Malicious]",
        "114.114.114.114  [Tulach | Virus Network IP]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Gregory",
          "display_name": "Gregory",
          "target": null
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "Matsnu",
          "display_name": "Matsnu",
          "target": null
        },
        {
          "id": "Vawtrak",
          "display_name": "Vawtrak",
          "target": null
        },
        {
          "id": "XRat",
          "display_name": "XRat",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "vSkimmer",
          "display_name": "vSkimmer",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Pykspa",
          "display_name": "Pykspa",
          "target": null
        },
        {
          "id": "SpyEye",
          "display_name": "SpyEye",
          "target": null
        },
        {
          "id": "Spitmo",
          "display_name": "Spitmo",
          "target": null
        },
        {
          "id": "Solar",
          "display_name": "Solar",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "DorkBot",
          "display_name": "DorkBot",
          "target": null
        },
        {
          "id": "Slingshot",
          "display_name": "Slingshot",
          "target": null
        },
        {
          "id": "Pony",
          "display_name": "Pony",
          "target": null
        },
        {
          "id": "Plasma RAT",
          "display_name": "Plasma RAT",
          "target": null
        },
        {
          "id": "Neutrino",
          "display_name": "Neutrino",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "NSIS",
          "display_name": "NSIS",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "GrandCrab",
          "display_name": "GrandCrab",
          "target": null
        },
        {
          "id": "Andromeda",
          "display_name": "Andromeda",
          "target": null
        },
        {
          "id": "Alinaos",
          "display_name": "Alinaos",
          "target": null
        },
        {
          "id": "HawkEye",
          "display_name": "HawkEye",
          "target": null
        },
        {
          "id": "Kraken",
          "display_name": "Kraken",
          "target": null
        },
        {
          "id": "Infy",
          "display_name": "Infy",
          "target": null
        },
        {
          "id": "Dexter",
          "display_name": "Dexter",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "ASCII",
          "display_name": "ASCII",
          "target": null
        },
        {
          "id": "Athena",
          "display_name": "Athena",
          "target": null
        },
        {
          "id": "Bambernek",
          "display_name": "Bambernek",
          "target": null
        },
        {
          "id": "BetaBot",
          "display_name": "BetaBot",
          "target": null
        },
        {
          "id": "COVID19",
          "display_name": "COVID19",
          "target": null
        },
        {
          "id": "Citadel",
          "display_name": "Citadel",
          "target": null
        },
        {
          "id": "Bondat",
          "display_name": "Bondat",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Hydra",
          "display_name": "Hydra",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Pinkslipbot",
          "display_name": "Pinkslipbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 124,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8736,
        "FileHash-MD5": 953,
        "FileHash-SHA1": 489,
        "FileHash-SHA256": 3566,
        "domain": 1516,
        "hostname": 2221,
        "CVE": 6
      },
      "indicator_count": 17487,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "820 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6583e3acc7f464d48a3503d1",
      "name": "Qkbot | Reddit",
      "description": "Qbot URL:  https://seedbeej.pk/tin/index.php?QBOT.zip found in Reddit Honeypot link: https://www.reddit.com/user\nbackdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork  with many capabilities, attack methods and demands.  An unsuspecting victim  always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware, malvertizing, fraud services, full control of badly compromised digital profiles which have been discovered.",
      "modified": "2024-01-20T02:02:19.559000",
      "created": "2023-12-21T07:05:16.695000",
      "tags": [
        "ssl certificate",
        "iocs",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "search",
        "threat",
        "paste",
        "blacklist https",
        "qakbot",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "ascii text",
        "pattern match",
        "file",
        "windows nt",
        "appdata",
        "indicator",
        "crlf line",
        "unicode text",
        "jpeg image",
        "mitre att",
        "hybrid",
        "general",
        "local",
        "error",
        "click",
        "strings",
        "microsoft",
        "threat analyzer",
        "urls https",
        "no data",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "heur",
        "malware site",
        "malicious site",
        "safe site",
        "malware",
        "html",
        "phishing site",
        "site top",
        "riskware",
        "unsafe",
        "artemis",
        "quasar rat",
        "downldr",
        "agent",
        "presenoker",
        "applicunwnt",
        "crack",
        "cve201711882",
        "win64",
        "iframe",
        "quasar",
        "trojanspy",
        "exit",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "traffic",
        "anonymizer",
        "brasil",
        "phishing three",
        "united",
        "phishing bank",
        "virustotal",
        "tech",
        "bank",
        "maltiverse",
        "hidelink",
        "samples",
        "spyware",
        "injector",
        "mon jan",
        "tld count",
        "wed dec",
        "download",
        "first",
        "team",
        "simda",
        "bambernek",
        "simda simda",
        "infy",
        "alexa",
        "gregory",
        "cyber threat",
        "phishing",
        "engineering",
        "covid19",
        "telefonica co",
        "malicious",
        "zbot",
        "zeus",
        "betabot",
        "suppobox",
        "citadel",
        "pony",
        "kraken",
        "redline stealer",
        "ransomware",
        "vawtrak",
        "athena",
        "neutrino",
        "alina",
        "andromeda",
        "dexter",
        "unknown",
        "keylogger",
        "hawkeye",
        "phase",
        "jackpos",
        "plasma",
        "spyeye",
        "spitmo",
        "slingshot",
        "ramnit",
        "emotet",
        "pykspa",
        "virut",
        "installcore",
        "dorkbot",
        "bondat",
        "union",
        "vskimmer",
        "xtrat",
        "solar",
        "grandcrab",
        "nymaim",
        "matsnu",
        "cutwail",
        "cobalt strike",
        "hydra",
        "tinba",
        "nsis",
        "memscan",
        "deepscan",
        "runescape",
        "backdoor",
        "reddit",
        "tulach"
      ],
      "references": [
        "https://seedbeej.pk/tin/index.php?QBOT.zip",
        "https://tulach.cc/ [phishing, exploits, malware spreader]",
        "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
        "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
        "198.54.115.46            [exploit_source]",
        "gadyniw.com          [command_and_control]",
        "gahyqah.com          [command_and_control]",
        "galyqaz.com            [command_and_control]",
        "lyvyxor.com             [command_and_control]",
        "puzylyp.com           [command_and_control]",
        "malicious.high.ml   [dropper]",
        "https://www.reddit.com/user"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Gregory",
          "display_name": "Gregory",
          "target": null
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "Matsnu",
          "display_name": "Matsnu",
          "target": null
        },
        {
          "id": "Vawtrak",
          "display_name": "Vawtrak",
          "target": null
        },
        {
          "id": "XRat",
          "display_name": "XRat",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "vSkimmer",
          "display_name": "vSkimmer",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Pykspa",
          "display_name": "Pykspa",
          "target": null
        },
        {
          "id": "SpyEye",
          "display_name": "SpyEye",
          "target": null
        },
        {
          "id": "Spitmo",
          "display_name": "Spitmo",
          "target": null
        },
        {
          "id": "Solar",
          "display_name": "Solar",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "DorkBot",
          "display_name": "DorkBot",
          "target": null
        },
        {
          "id": "Slingshot",
          "display_name": "Slingshot",
          "target": null
        },
        {
          "id": "Pony",
          "display_name": "Pony",
          "target": null
        },
        {
          "id": "Plasma RAT",
          "display_name": "Plasma RAT",
          "target": null
        },
        {
          "id": "Neutrino",
          "display_name": "Neutrino",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "NSIS",
          "display_name": "NSIS",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "GrandCrab",
          "display_name": "GrandCrab",
          "target": null
        },
        {
          "id": "Andromeda",
          "display_name": "Andromeda",
          "target": null
        },
        {
          "id": "Alinaos",
          "display_name": "Alinaos",
          "target": null
        },
        {
          "id": "HawkEye",
          "display_name": "HawkEye",
          "target": null
        },
        {
          "id": "Kraken",
          "display_name": "Kraken",
          "target": null
        },
        {
          "id": "Infy",
          "display_name": "Infy",
          "target": null
        },
        {
          "id": "Dexter",
          "display_name": "Dexter",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "ASCII",
          "display_name": "ASCII",
          "target": null
        },
        {
          "id": "Athena",
          "display_name": "Athena",
          "target": null
        },
        {
          "id": "Bambernek",
          "display_name": "Bambernek",
          "target": null
        },
        {
          "id": "BetaBot",
          "display_name": "BetaBot",
          "target": null
        },
        {
          "id": "COVID19",
          "display_name": "COVID19",
          "target": null
        },
        {
          "id": "Citadel",
          "display_name": "Citadel",
          "target": null
        },
        {
          "id": "Bondat",
          "display_name": "Bondat",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Hydra",
          "display_name": "Hydra",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 101,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8343,
        "FileHash-MD5": 953,
        "FileHash-SHA1": 489,
        "FileHash-SHA256": 3565,
        "domain": 1494,
        "hostname": 2218,
        "CVE": 6
      },
      "indicator_count": 17068,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "820 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6583e3a2d1432cbf9054d26d",
      "name": "Qkbot | Reddit",
      "description": "Qbot URL:  https://seedbeej.pk/tin/index.php?QBOT.zip found in Reddit Honeypot link: https://www.reddit.com/user\nbackdoor second stage developed for distribution as a password stealer. Qbot, seemingly common; is a large botnetwork  with many capabilities, attack methods and demands.  An unsuspecting victim  always be in botnetwork. Qbot encompasses many other bot networks, trojans, network rats, spyware, malvertizing, fraud services, full control of badly compromised digital profiles which have been discovered.",
      "modified": "2024-01-20T02:02:19.559000",
      "created": "2023-12-21T07:05:06.936000",
      "tags": [
        "ssl certificate",
        "iocs",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "search",
        "threat",
        "paste",
        "blacklist https",
        "qakbot",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "ascii text",
        "pattern match",
        "file",
        "windows nt",
        "appdata",
        "indicator",
        "crlf line",
        "unicode text",
        "jpeg image",
        "mitre att",
        "hybrid",
        "general",
        "local",
        "error",
        "click",
        "strings",
        "microsoft",
        "threat analyzer",
        "urls https",
        "no data",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "heur",
        "malware site",
        "malicious site",
        "safe site",
        "malware",
        "html",
        "phishing site",
        "site top",
        "riskware",
        "unsafe",
        "artemis",
        "quasar rat",
        "downldr",
        "agent",
        "presenoker",
        "applicunwnt",
        "crack",
        "cve201711882",
        "win64",
        "iframe",
        "quasar",
        "trojanspy",
        "exit",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "traffic",
        "anonymizer",
        "brasil",
        "phishing three",
        "united",
        "phishing bank",
        "virustotal",
        "tech",
        "bank",
        "maltiverse",
        "hidelink",
        "samples",
        "spyware",
        "injector",
        "mon jan",
        "tld count",
        "wed dec",
        "download",
        "first",
        "team",
        "simda",
        "bambernek",
        "simda simda",
        "infy",
        "alexa",
        "gregory",
        "cyber threat",
        "phishing",
        "engineering",
        "covid19",
        "telefonica co",
        "malicious",
        "zbot",
        "zeus",
        "betabot",
        "suppobox",
        "citadel",
        "pony",
        "kraken",
        "redline stealer",
        "ransomware",
        "vawtrak",
        "athena",
        "neutrino",
        "alina",
        "andromeda",
        "dexter",
        "unknown",
        "keylogger",
        "hawkeye",
        "phase",
        "jackpos",
        "plasma",
        "spyeye",
        "spitmo",
        "slingshot",
        "ramnit",
        "emotet",
        "pykspa",
        "virut",
        "installcore",
        "dorkbot",
        "bondat",
        "union",
        "vskimmer",
        "xtrat",
        "solar",
        "grandcrab",
        "nymaim",
        "matsnu",
        "cutwail",
        "cobalt strike",
        "hydra",
        "tinba",
        "nsis",
        "memscan",
        "deepscan",
        "runescape",
        "backdoor",
        "reddit",
        "tulach"
      ],
      "references": [
        "https://seedbeej.pk/tin/index.php?QBOT.zip",
        "https://tulach.cc/ [phishing, exploits, malware spreader]",
        "https://www.hybrid-analysis.com/sample/a8decf589e5ec26f1e994a3923fc245db98f681f951d2bb8e1fcce1d8fef5293",
        "https://www.virustotal.com/gui/url/000c01d40db51f156933c624f23e776cb2c1fd60b8f1840b13b9622886a8e918/community",
        "198.54.115.46            [exploit_source]",
        "gadyniw.com          [command_and_control]",
        "gahyqah.com          [command_and_control]",
        "galyqaz.com            [command_and_control]",
        "lyvyxor.com             [command_and_control]",
        "puzylyp.com           [command_and_control]",
        "malicious.high.ml   [dropper]",
        "https://www.reddit.com/user"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Gregory",
          "display_name": "Gregory",
          "target": null
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "Matsnu",
          "display_name": "Matsnu",
          "target": null
        },
        {
          "id": "Vawtrak",
          "display_name": "Vawtrak",
          "target": null
        },
        {
          "id": "XRat",
          "display_name": "XRat",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "vSkimmer",
          "display_name": "vSkimmer",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Pykspa",
          "display_name": "Pykspa",
          "target": null
        },
        {
          "id": "SpyEye",
          "display_name": "SpyEye",
          "target": null
        },
        {
          "id": "Spitmo",
          "display_name": "Spitmo",
          "target": null
        },
        {
          "id": "Solar",
          "display_name": "Solar",
          "target": null
        },
        {
          "id": "Nymaim",
          "display_name": "Nymaim",
          "target": null
        },
        {
          "id": "DorkBot",
          "display_name": "DorkBot",
          "target": null
        },
        {
          "id": "Slingshot",
          "display_name": "Slingshot",
          "target": null
        },
        {
          "id": "Pony",
          "display_name": "Pony",
          "target": null
        },
        {
          "id": "Plasma RAT",
          "display_name": "Plasma RAT",
          "target": null
        },
        {
          "id": "Neutrino",
          "display_name": "Neutrino",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "NSIS",
          "display_name": "NSIS",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "GrandCrab",
          "display_name": "GrandCrab",
          "target": null
        },
        {
          "id": "Andromeda",
          "display_name": "Andromeda",
          "target": null
        },
        {
          "id": "Alinaos",
          "display_name": "Alinaos",
          "target": null
        },
        {
          "id": "HawkEye",
          "display_name": "HawkEye",
          "target": null
        },
        {
          "id": "Kraken",
          "display_name": "Kraken",
          "target": null
        },
        {
          "id": "Infy",
          "display_name": "Infy",
          "target": null
        },
        {
          "id": "Dexter",
          "display_name": "Dexter",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "ASCII",
          "display_name": "ASCII",
          "target": null
        },
        {
          "id": "Athena",
          "display_name": "Athena",
          "target": null
        },
        {
          "id": "Bambernek",
          "display_name": "Bambernek",
          "target": null
        },
        {
          "id": "BetaBot",
          "display_name": "BetaBot",
          "target": null
        },
        {
          "id": "COVID19",
          "display_name": "COVID19",
          "target": null
        },
        {
          "id": "Citadel",
          "display_name": "Citadel",
          "target": null
        },
        {
          "id": "Bondat",
          "display_name": "Bondat",
          "target": null
        },
        {
          "id": "HideLink",
          "display_name": "HideLink",
          "target": null
        },
        {
          "id": "Hydra",
          "display_name": "Hydra",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 98,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8343,
        "FileHash-MD5": 953,
        "FileHash-SHA1": 489,
        "FileHash-SHA256": 3565,
        "domain": 1494,
        "hostname": 2218,
        "CVE": 6
      },
      "indicator_count": 17068,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "820 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6561581c55aacc7f571968af",
      "name": "Mirai | Inmortal | Loki | SpyEye",
      "description": "attack, cyber threat, network, vehicle tracking, cnc, athena cyber stalking, betabot, social engineering, Cisco umbrella, bambernek simda, active threat, ongoing spreader, spyware, redline stealer, qakbot, anilise, milemighmedia, sweetheart videos botnetwork, targeting ,  redirects, network, targeted toyota tracking",
      "modified": "2023-12-25T01:00:05.300000",
      "created": "2023-11-25T02:12:44.278000",
      "tags": [
        "replication",
        "date",
        "graph summary",
        "ssl certificate",
        "contacted",
        "whois record",
        "historical ssl",
        "threat roundup",
        "august",
        "tsara brashears",
        "whois whois",
        "execution",
        "dropped",
        "february",
        "no data",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "million",
        "alexa top",
        "team",
        "malicious site",
        "malware",
        "phishing",
        "union",
        "bank",
        "unsafe",
        "united",
        "bambernek simda",
        "commerce",
        "pykspa",
        "bambernek",
        "ip reputation",
        "database",
        "vawtrak",
        "blacklist http",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "november",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "reverse dns",
        "software",
        "general full",
        "resource",
        "hash",
        "get h2",
        "protocol h2",
        "security tls",
        "url http",
        "main",
        "attention",
        "please",
        "adblock pro",
        "loki",
        "mon jul",
        "first",
        "linkid252669",
        "pjp3sltkz",
        "heur",
        "malware site",
        "phishing site",
        "artemis",
        "iframe",
        "riskware",
        "exploit",
        "fakealert",
        "nircmd",
        "swrort",
        "downldr",
        "crack",
        "filetour",
        "cleaner",
        "wacatac",
        "xtrat",
        "genkryptik",
        "opencandy",
        "tiggre",
        "presenoker",
        "agent",
        "conduit",
        "xrat",
        "coinminer",
        "dropper",
        "alexa",
        "acint",
        "systweak",
        "behav",
        "download",
        "zbot",
        "xtreme",
        "installcore",
        "unruy",
        "patcher",
        "adload",
        "win64",
        "applicunwnt",
        "trojanspy",
        "webtoolbar",
        "cyber threat",
        "engineering",
        "firehol",
        "phishtank",
        "emotet",
        "ransomware",
        "malicious",
        "cobalt strike",
        "suppobox",
        "bradesco",
        "facebook",
        "banco",
        "nymaim",
        "smsspy",
        "stealer",
        "service",
        "mirai",
        "pony",
        "nanocore",
        "asyncrat",
        "downloader",
        "deepscan",
        "virut",
        "qakbot",
        "name verdict",
        "falcon sandbox",
        "blacklist https",
        "malicious url",
        "filerepmetagen",
        "et cins",
        "active threat",
        "reputation ip",
        "threats et",
        "cins active",
        "poor reputation",
        "ip tcp",
        "C2",
        "command_and_control",
        "spyware",
        "tracking",
        "targeting",
        "cyber stalking",
        "hostname",
        "simda",
        "kraken",
        "betabot",
        "zeus",
        "ramnit",
        "plasma",
        "citadel",
        "athena",
        "neutrino",
        "alina",
        "andromeda",
        "dexter",
        "unknown",
        "keylogger",
        "hawkeye",
        "phase",
        "jackpos",
        "spyeye",
        "vskimmer",
        "spitmo",
        "slingshot",
        "warbot",
        "redline stealer",
        "steam",
        "bandoo",
        "matsnu",
        "maltiverse",
        "bambernek gen",
        "internet storm",
        "infy",
        "inmortal",
        "addtopayload",
        "attack",
        "malvertizing"
      ],
      "references": [
        "https://networkpccontrol.com/video-player-1/?clickid=4030fe2twwhgxaa9&domain=standardtrackerchain.com&uclick=e2twwhgx&uclickhash=e2twwhgx-e2twwhgx-xoq53y-0-3zvc3y-oj1m9r-oj1m1n-5da44a",
        "https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45/65609b66e63f64cae305c749",
        "https://www.hybrid-analysis.com/sample/347314196559e7fbc75fc532daa774727b897d3a2156ea1328861f3b66f677a5/656146284d68f73e2306b6ad",
        "http://dev.findatoyota.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "SpyEye",
          "display_name": "SpyEye",
          "target": null
        },
        {
          "id": "Citadel",
          "display_name": "Citadel",
          "target": null
        },
        {
          "id": "MilesMX",
          "display_name": "MilesMX",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 81,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2450,
        "FileHash-SHA256": 2684,
        "domain": 1254,
        "URL": 9244,
        "CVE": 13,
        "FileHash-MD5": 931,
        "FileHash-SHA1": 487
      },
      "indicator_count": 17063,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65612df1531ea0c35d79b1f4",
      "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
      "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
      "modified": "2023-12-24T22:02:36.942000",
      "created": "2023-11-24T23:12:49.909000",
      "tags": [
        "adgroupid",
        "x350",
        "lwii",
        "ejan",
        "kfrontier",
        "qkvt0tvj ejan",
        "eja ota",
        "njii",
        "mqkvt0tvj ejan",
        "eqkoatlvqia",
        "unknown",
        "expiration",
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "vj101",
        "slc1",
        "scan endpoints",
        "all octoseek",
        "create new",
        "uw1600",
        "uh1200",
        "next",
        "pulse use",
        "searchbox0",
        "kwwikipedia",
        "bit64",
        "oswindows",
        "cardstandard",
        "pack",
        "kw1download",
        "qchlemail no",
        "bit32bit",
        "ver9",
        "from",
        "mpass",
        "num0",
        "dig0",
        "kbetu1",
        "maxads0",
        "kld1040",
        "opnslfp1",
        "downloader",
        "pdf report",
        "clickid",
        "price",
        "campaignid",
        "domain",
        "text",
        "hostname",
        "aufffdufffd",
        "hostname xn",
        "pcap",
        "filehashsha256",
        "stix",
        "filehashmd5",
        "filehashsha1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 805,
        "URL": 9065,
        "hostname": 3080,
        "FileHash-MD5": 1373,
        "domain": 1190,
        "FileHash-SHA256": 3468,
        "email": 6,
        "CIDR": 4,
        "CVE": 12
      },
      "indicator_count": 19003,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.gacyhis.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.gacyhis.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776628370.4326503
}