{
  "type": "URL",
  "indicator": "https://www.globalsign.com.au",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.globalsign.com.au",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3775535927,
      "indicator": "https://www.globalsign.com.au",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 40,
      "pulses": [
        {
          "id": "65afcb842689eb776c0737e5",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-23T14:21:56.725000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aab8eb55243c504a2cb4c0",
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aab8eb55243c504a2cb4c0",
          "name": "Maui Ransomware",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-19T18:01:15.365000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b87d2d435bdad9ce80a3",
          "name": "Racoon Stealer ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:47:09.818000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65a9b4296442cc8db50a264f",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a9b4296442cc8db50a264f",
          "name": "Maui Ransomware ",
          "description": "",
          "modified": "2024-02-17T23:00:21.788000",
          "created": "2024-01-18T23:28:41.569000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653977171f690fb9ab978bf3",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2470,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8634,
            "hostname": 2629,
            "email": 4,
            "URL": 5605,
            "CVE": 12
          },
          "indicator_count": 20651,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659d687f92ebb4f3d613ae0c",
          "name": "Mimikatz | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2024-01-09T15:38:39.547000",
          "created": "2024-01-09T15:38:39.547000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "832 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9a1c71847ed3f62bca19",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T02:44:44.329000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656457d8dfbb95a0be58b263",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-11-27T08:48:22.997000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 76,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa406d0b8009df583c87c",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T03:27:02.624000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9b46382eefe9b0acda21",
          "name": "http://fireeyei.iowa.gov/",
          "description": "",
          "modified": "2023-12-26T23:03:25.397000",
          "created": "2023-12-02T02:49:42.129000",
          "tags": [
            "passive dns",
            "urls",
            "scan endpoints",
            "pulse pulses",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "script",
            "beginstring",
            "severity",
            "null",
            "unknown",
            "date",
            "error",
            "refresh",
            "span",
            "class",
            "generator",
            "critical",
            "tools",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "referrer",
            "resolutions",
            "contacted",
            "historical",
            "communicating",
            "whois whois",
            "siblings",
            "execution",
            "united",
            "malware",
            "phishing site",
            "malicious site",
            "malware site",
            "ibm xforce",
            "exchange",
            "mail spammer",
            "firehol",
            "phishing",
            "fuery",
            "unsafe",
            "rostpay",
            "wacatac",
            "genkryptik",
            "riskware",
            "artemis",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "team",
            "installcore",
            "generic malware",
            "keylogger",
            "downloader",
            "tag count",
            "mon feb",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "blacklist https",
            "productidis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "heur",
            "filerepmalware",
            "seraph",
            "webcompanion",
            "redline stealer",
            "opencandy",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "maltiverse",
            "site top",
            "site safe",
            "malicious",
            "cve201711882",
            "phish",
            "driverreviver",
            "o.gen",
            "redline",
            "blacklist http",
            "microsoft",
            "detection list",
            "blacklist",
            "south carolina",
            "union",
            "traffic",
            "node tcp",
            "spammer",
            "tor known",
            "tor relayrouter",
            "host"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "O.gen",
              "display_name": "O.gen",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65642d43a6029c41643dfb5e",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 816,
            "hostname": 1542,
            "URL": 5023,
            "FileHash-SHA256": 1827,
            "FileHash-MD5": 786,
            "FileHash-SHA1": 403,
            "CVE": 4
          },
          "indicator_count": 10401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65642d43a6029c41643dfb5e",
          "name": "http://fireeyei.iowa.gov/",
          "description": "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
          "modified": "2023-12-26T23:03:25.397000",
          "created": "2023-11-27T05:46:43.630000",
          "tags": [
            "passive dns",
            "urls",
            "scan endpoints",
            "pulse pulses",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "script",
            "beginstring",
            "severity",
            "null",
            "unknown",
            "date",
            "error",
            "refresh",
            "span",
            "class",
            "generator",
            "critical",
            "tools",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "referrer",
            "resolutions",
            "contacted",
            "historical",
            "communicating",
            "whois whois",
            "siblings",
            "execution",
            "united",
            "malware",
            "phishing site",
            "malicious site",
            "malware site",
            "ibm xforce",
            "exchange",
            "mail spammer",
            "firehol",
            "phishing",
            "fuery",
            "unsafe",
            "rostpay",
            "wacatac",
            "genkryptik",
            "riskware",
            "artemis",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "team",
            "installcore",
            "generic malware",
            "keylogger",
            "downloader",
            "tag count",
            "mon feb",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "blacklist https",
            "productidis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "heur",
            "filerepmalware",
            "seraph",
            "webcompanion",
            "redline stealer",
            "opencandy",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "maltiverse",
            "site top",
            "site safe",
            "malicious",
            "cve201711882",
            "phish",
            "driverreviver",
            "o.gen",
            "redline",
            "blacklist http",
            "microsoft",
            "detection list",
            "blacklist",
            "south carolina",
            "union",
            "traffic",
            "node tcp",
            "spammer",
            "tor known",
            "tor relayrouter",
            "host"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "O.gen",
              "display_name": "O.gen",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 816,
            "hostname": 1542,
            "URL": 5023,
            "FileHash-SHA256": 1827,
            "FileHash-MD5": 786,
            "FileHash-SHA1": 403,
            "CVE": 4
          },
          "indicator_count": 10401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa27f81a9096f5889a9d0",
          "name": "WebToolbar | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-12-02T03:20:31.494000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655ce5116519bd86d1f1bdee",
          "name": "FormBook | www.ssc.spaceforce.mil 'Hoax' | Spyware | Fraud Services",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T17:12:49.783000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655cd0f065d2e5a6c92369e5",
          "name": "www.ssc.spaceforce.mil",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T15:46:56.740000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9c2eeebaf7b69d0e12ba",
          "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
          "description": "",
          "modified": "2023-12-20T17:01:34.161000",
          "created": "2023-12-02T02:53:34.585000",
          "tags": [
            "safe site",
            "million",
            "cisco umbrella",
            "alexa top",
            "site",
            "tag count",
            "tld count",
            "jul jan",
            "team alexa",
            "count blacklist",
            "maltiverse",
            "redirme",
            "cronup threat",
            "intel malware",
            "malicious site",
            "malware",
            "no data",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "engineering",
            "team",
            "malware site",
            "covid19",
            "phishing site",
            "phishing",
            "phishtank",
            "bank",
            "zbot",
            "malicious",
            "download",
            "suppobox",
            "zeus",
            "nymaim",
            "matsnu",
            "artemis",
            "virut",
            "panama",
            "smsspy",
            "cobalt strike",
            "emotet",
            "bradesco",
            "stealer",
            "facebook",
            "service",
            "simda",
            "runescape",
            "cutwail",
            "unruy",
            "bandoo",
            "tinba",
            "pykspa",
            "domaiq",
            "ave maria",
            "citadel",
            "pony",
            "keitaro",
            "ponmocup",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "sha256",
            "sha1",
            "ascii text",
            "date",
            "unknown",
            "body",
            "error",
            "class",
            "generator",
            "critical",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "malicious url",
            "union",
            "unsafe",
            "node tcp",
            "traffic",
            "tor known",
            "tor relayrouter",
            "spammer",
            "threats et",
            "ssl certificate",
            "contacted",
            "whois record",
            "whois whois",
            "historical ssl",
            "apple ios",
            "resolutions",
            "bundled",
            "referrer",
            "collections",
            "android",
            "banker",
            "keylogger",
            "generic malware",
            "generic",
            "blacklist http",
            "ac32a",
            "heur",
            "alexa",
            "xtrat",
            "iframe",
            "installcore",
            "win64",
            "crack",
            "xrat",
            "nircmd",
            "swrort",
            "agent",
            "filetour",
            "cleaner",
            "patcher",
            "adload",
            "wacatac",
            "riskware",
            "acint",
            "conduit",
            "fakealert",
            "opencandy",
            "xtreme",
            "downldr",
            "outbreak",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "installpack",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "presenoker",
            "fusioncore",
            "exploit",
            "filerepmetagen",
            "download json",
            "hostname",
            "hostnames",
            "mail spammer",
            "anonymizer",
            "firehol proxy",
            "asyncrat",
            "genkryptik",
            "fuery",
            "webtoolbar",
            "trojanspy",
            "dropped",
            "execution",
            "contacted urls",
            "http spammer",
            "host",
            "ip address",
            "site top",
            "site safe",
            "blacklist https",
            "tsara brashears",
            "kgs0",
            "kls0",
            "critical risk",
            "attack",
            "hacktool",
            "installer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Latvia",
            "Poland",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655b9a90e44a70d0fbbde981",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1117,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3426,
            "domain": 977,
            "hostname": 2269,
            "URL": 5554,
            "CVE": 23,
            "URI": 8,
            "Mutex": 1
          },
          "indicator_count": 14039,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655b9a90e44a70d0fbbde981",
          "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
          "description": "Domain stated ' SEIZED' by Departing Homeland Security\nSeizure links below seem a bit questionable: \n\nhttp://server3.elgenero.com/iprc_seized_banner.png\nhttp://kickass.to/IPRC_Seized_2016_kat.jpg\nhttp://kickass.to/the-adventures-of-tom-sawyer-t2068537.html\t\nhttp://bludv.tv/iprc_seized_banner.png\nhttp://z-lib.org/iprc_seized_banner.png\nIPRC_Seized_2016_kat.jpg\n... just banners? Moved and continue? Okay.\nListed below also listed in seized domain. Domains,URL's and Botnetwork Hosts still seem to exist.\nhttp://alohatube.xyz/search/tsara-brashears\nalohatube.xyz\nhttps://alohatube.xyz/search/tsara-brashears\nhttps://www.anyxxxtube.net/search-porn/tsara-brashears/\nhttp://45.159.189.105/bot/regex\t\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbia\t\nnr-data.net",
          "modified": "2023-12-20T17:01:34.161000",
          "created": "2023-11-20T17:42:40.771000",
          "tags": [
            "safe site",
            "million",
            "cisco umbrella",
            "alexa top",
            "site",
            "tag count",
            "tld count",
            "jul jan",
            "team alexa",
            "count blacklist",
            "maltiverse",
            "redirme",
            "cronup threat",
            "intel malware",
            "malicious site",
            "malware",
            "no data",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "engineering",
            "team",
            "malware site",
            "covid19",
            "phishing site",
            "phishing",
            "phishtank",
            "bank",
            "zbot",
            "malicious",
            "download",
            "suppobox",
            "zeus",
            "nymaim",
            "matsnu",
            "artemis",
            "virut",
            "panama",
            "smsspy",
            "cobalt strike",
            "emotet",
            "bradesco",
            "stealer",
            "facebook",
            "service",
            "simda",
            "runescape",
            "cutwail",
            "unruy",
            "bandoo",
            "tinba",
            "pykspa",
            "domaiq",
            "ave maria",
            "citadel",
            "pony",
            "keitaro",
            "ponmocup",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "sha256",
            "sha1",
            "ascii text",
            "date",
            "unknown",
            "body",
            "error",
            "class",
            "generator",
            "critical",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "malicious url",
            "union",
            "unsafe",
            "node tcp",
            "traffic",
            "tor known",
            "tor relayrouter",
            "spammer",
            "threats et",
            "ssl certificate",
            "contacted",
            "whois record",
            "whois whois",
            "historical ssl",
            "apple ios",
            "resolutions",
            "bundled",
            "referrer",
            "collections",
            "android",
            "banker",
            "keylogger",
            "generic malware",
            "generic",
            "blacklist http",
            "ac32a",
            "heur",
            "alexa",
            "xtrat",
            "iframe",
            "installcore",
            "win64",
            "crack",
            "xrat",
            "nircmd",
            "swrort",
            "agent",
            "filetour",
            "cleaner",
            "patcher",
            "adload",
            "wacatac",
            "riskware",
            "acint",
            "conduit",
            "fakealert",
            "opencandy",
            "xtreme",
            "downldr",
            "outbreak",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "installpack",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "presenoker",
            "fusioncore",
            "exploit",
            "filerepmetagen",
            "download json",
            "hostname",
            "hostnames",
            "mail spammer",
            "anonymizer",
            "firehol proxy",
            "asyncrat",
            "genkryptik",
            "fuery",
            "webtoolbar",
            "trojanspy",
            "dropped",
            "execution",
            "contacted urls",
            "http spammer",
            "host",
            "ip address",
            "site top",
            "site safe",
            "blacklist https",
            "tsara brashears",
            "kgs0",
            "kls0",
            "critical risk",
            "attack",
            "hacktool",
            "installer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Latvia",
            "Poland",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1117,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3426,
            "domain": 977,
            "hostname": 2269,
            "URL": 5554,
            "CVE": 23,
            "URI": 8,
            "Mutex": 1
          },
          "indicator_count": 14039,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655af35616dbd4781c681948",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-20T05:49:10.586000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655a13e4538e896c00f2077e",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655a13e4538e896c00f2077e",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "This report is generated by MITRE ATT&CK\u2122 and produced by the team at the University of California, San Francisco, and is available on the web, via the Microsoft Research website.\nTulach, 114.114.114.114, spyware, phishing, fraud, malvertizing, password cracker, iPhone unlocker, malicious, media sharing, miscellaneous attacks.",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-19T13:55:48.898000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655aef8a8cc2e0929f2aa5ea",
          "name": "Python Initiated Connection | Spyware | Remote Attacks |",
          "description": "",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-20T05:32:58.400000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655950034e6ae4650a6b02ce",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655950034e6ae4650a6b02ce",
          "name": "Python Initiated Connection | Spyware |  Remote Attacks  |  | Part 4",
          "description": "Apple, Mac, iOS, phishing, frauds services, malware, trojan.allesgreh/trojan.allesgreh/respat, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and possibly others. Python Initiated Connection, WScriptShell_Case_Anomaly.\nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-19T00:00:03.258000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b9da2479892590b77a",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:37.411000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b4d8c905f4475d8bcc",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:32.856000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568a146bed0e035fee11e7",
          "name": "Threat Network",
          "description": "",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-16T21:31:00.134000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65552832e2ebc1d277d13420",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655689e7e3250ae1a6a9be2f",
          "name": "t.call | https://www.milehighmedia.com/legal/2257 (phishing)",
          "description": "",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-16T21:30:15.183000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65552550c406412cd83dec6f",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65552832e2ebc1d277d13420",
          "name": "Threat Network",
          "description": "Malvertizing,\nt.call,  \nHello,\nhttps://www.milehighmedia.com/legal/2257,\nphishing,\ntrojanspyware,\nmonitoring,\nhttps://to.hofer.at/iphone,\nNXDOMAIN",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-15T20:21:06.879000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65552550c406412cd83dec6f",
          "name": "t.call | https://www.milehighmedia.com/legal/2257 (phishing)",
          "description": "Malvertizing\nt.call\nhttps://www.milehighmedia.com/legal/2257 (T Brazzers| Phishing)\nphishing\ntrojanspyware\nmonitoring",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-15T20:08:48.881000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c8e530066ae793dc64",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:18:00.623000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136b5eb9bdd21070ff9d7",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:41.263000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 70,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c1ac991f85328604d2",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:52.382000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65413ea960cc79abf6d446fb",
          "name": "Vawtrak credential stealer | CNC",
          "description": "Cyber warfare\nTracking\nMonitoring\nMalvertizing\nCNC\nKeylogging\nBotNet\nSever Privacy Invasion",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:51:37.016000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 74,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545be6e02e0f9f82cb1febf",
          "name": "Vawtrak credential stealer | CNC",
          "description": "",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-11-04T03:45:50.234000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65413ea960cc79abf6d446fb",
          "export_count": 86,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654140bae73f795aa914e8de",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Target Tsara Brashears",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-31T18:00:26.439000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "65401d73e96dd70037ed22a7",
          "export_count": 98,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544cbbca7610e92e4262c47",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Targeting",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-11-03T10:30:20.965000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "654140bae73f795aa914e8de",
          "export_count": 108,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d8480e4a9ed725f6458",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:56.820000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d76b057b79aaf7ba4a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:40.239000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d73e96dd70037ed22a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:39.802000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d5ee5a7359a5e815a6a",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:18.712000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653960d6d09796c4ba4c1e90",
          "name": "CVE JAR Found | Massive active Malicious | unlatched issues",
          "description": "Monitoring Tsara Brashears - Extreme cyber attack against documented as alleged SA victim. Non-Adversarial Tsara Brashears inflicted with  highly malicious Malware auto populated. Massive online attack on Tsara Brashears defaced digital profile. Attacks primarily by Adversarial Tulach malware.\nDaisy Coleman [deceased] moderate malware attack against target a documented SA survivor.\nThis is a revenge attacker. \nPhysical harm imminence [HIGH] SOS\nEdward Snowden speaks of similar attacks against American citizen. Was target warned of malware status or massive attack. Made aware of Botnet by any authority?",
          "modified": "2023-11-24T12:03:49.398000",
          "created": "2023-10-25T18:39:18.723000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 61,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2295,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 7727,
            "hostname": 2252,
            "email": 3,
            "URL": 4406,
            "CVE": 10
          },
          "indicator_count": 17990,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "878 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f219ce051cf01e9a6be8b",
          "name": "Speechless | Critical",
          "description": "",
          "modified": "2023-11-24T12:03:49.398000",
          "created": "2023-10-30T03:23:08.790000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653977171f690fb9ab978bf3",
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2457,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8455,
            "hostname": 2605,
            "email": 3,
            "URL": 5548,
            "CVE": 12
          },
          "indicator_count": 20377,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "878 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f2100b535d359accfc3a6",
          "name": "CVE JAR Found | Massive active Malicious | Tulach & AIG associated | Scam",
          "description": "",
          "modified": "2023-11-24T12:03:49.398000",
          "created": "2023-10-30T03:20:32.349000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653960d6d09796c4ba4c1e90",
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2295,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 7727,
            "hostname": 2252,
            "email": 3,
            "URL": 4406,
            "CVE": 10
          },
          "indicator_count": 17990,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "878 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653977171f690fb9ab978bf3",
          "name": "Speechless | Critical",
          "description": "Cyber threat. Target Tsara Brashears is now Tsara Brashears Malware. Looks like an investigation, might be a legitimate investigation. I have no insight as to whether investigation is warranted, staged, or silencing?? \nVerdict:\nAdversarial monitoring, harassment, Libel, cyber crime by a genius exploiting regulations and escalation privileges. Target at high risk.",
          "modified": "2023-11-24T12:03:49.398000",
          "created": "2023-10-25T20:14:14.532000",
          "tags": [
            "first",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "namecheap inc",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "win32 exe",
            "win32 dll",
            "type name",
            "user",
            "dns replication",
            "description",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "community https",
            "urls",
            "amazonaes",
            "china telecom",
            "sector",
            "export",
            "cloud",
            "mb opera",
            "mb iesettings",
            "kb acrotray",
            "installer",
            "samplepath",
            "ssl certificate",
            "whois record",
            "tsara brashears",
            "apple ios",
            "p2404",
            "malware",
            "apple",
            "password",
            "critical risk",
            "password bypass",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "emotet",
            "tulach",
            "tulach.cc",
            "united",
            "heur",
            "team",
            "firehol",
            "malware site",
            "cyber threat",
            "malicious site",
            "phishing",
            "phishing site",
            "malicious",
            "downer",
            "artemis",
            "dnspionage",
            "kuaizip",
            "fusioncore",
            "softcnapp",
            "downloader",
            "trojan",
            "zbot",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "phishtank",
            "bank",
            "unsafe",
            "riskware",
            "alexa",
            "service",
            "facebook",
            "presenoker",
            "agent",
            "stealer",
            "phish",
            "union",
            "azorult",
            "runescape",
            "generic",
            "crack",
            "dapato",
            "iframe",
            "downldr",
            "vidar",
            "raccoon",
            "remcos",
            "miner",
            "agenttesla",
            "unknown",
            "detplock",
            "networm",
            "win64",
            "trickbot",
            "telecom",
            "media",
            "webtoolbar",
            "trojanspy",
            "no data",
            "tag count",
            "tld count",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist https",
            "pattern match",
            "samuel tulach",
            "file",
            "localappdata",
            "ascii text",
            "title",
            "windows",
            "hyperv",
            "span",
            "mitre att",
            "meta",
            "path",
            "light",
            "dark",
            "vmprotect",
            "main",
            "footer",
            "body",
            "class",
            "hybrid",
            "accept",
            "local",
            "click",
            "strings",
            "error",
            "script",
            "form",
            "root ca",
            "textarea",
            "github",
            "input",
            "trust",
            "general",
            "june",
            "threat roundup",
            "july",
            "whois whois",
            "collection",
            "august",
            "lolkek",
            "ransomware",
            "ursnif",
            "lockbit",
            "chaos",
            "quasar",
            "april",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "cobalt strike",
            "attack",
            "bitrat",
            "formbook",
            "qakbot",
            "ransomexx",
            "gootloader",
            "maui ransomware",
            "Cobalt Strike",
            "physical threat",
            "target",
            "contacted circa 10.23.2023-"
          ],
          "references": [
            "tulach.cc [Adversarial Malware Attack Source]",
            "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
            "init-p01st.push.apple.com",
            "newrelic.se    [Apple Collection]",
            "apple-dns.net.   [Apple email collection]",
            "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
            "nr-data.net [ Hidden private Apple data collection]",
            "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
            "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
            "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
            "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
            "mobile.twitter.com [titled hashtag Daisy Coleman]",
            "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
            "12 CVE exploits posted in 'scoreblue' CVE tally",
            "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
            "https://pin.it/ [SQLi Dumper]",
            "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
            "msftconnecttest.com",
            "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
            "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
            "104.200.22.130 Command and Control",
            "aig.com",
            "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
            "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
            "103.224.212.34 scanning_host",
            "0-1.duckdns.org [malicious]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Daisy Coleman",
              "display_name": "Daisy Coleman",
              "target": null
            },
            {
              "id": "Twitter Malware",
              "display_name": "Twitter Malware",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "CVE JAR",
              "display_name": "CVE JAR",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Death Bitches",
              "display_name": "Death Bitches",
              "target": null
            },
            {
              "id": "Bit RAT",
              "display_name": "Bit RAT",
              "target": null
            },
            {
              "id": "Swisyn",
              "display_name": "Swisyn",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Fusioncore",
              "display_name": "Fusioncore",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "GootLoader",
              "display_name": "GootLoader",
              "target": null
            },
            {
              "id": "Raccoon",
              "display_name": "Raccoon",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Apple Malware",
              "display_name": "Apple Malware",
              "target": null
            },
            {
              "id": "FonePaw",
              "display_name": "FonePaw",
              "target": null
            },
            {
              "id": "Amazon AES",
              "display_name": "Amazon AES",
              "target": null
            },
            {
              "id": "Facebook HT",
              "display_name": "Facebook HT",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla - S0331",
              "display_name": "Agent Tesla - S0331",
              "target": null
            },
            {
              "id": "Networm",
              "display_name": "Networm",
              "target": null
            },
            {
              "id": "Dapato",
              "display_name": "Dapato",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "DNSpionage",
              "display_name": "DNSpionage",
              "target": null
            },
            {
              "id": "Trojan:Win32/Detplock",
              "display_name": "Trojan:Win32/Detplock",
              "target": "/malware/Trojan:Win32/Detplock"
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "PwndLocker",
              "display_name": "PwndLocker",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 57,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 641,
            "domain": 2457,
            "FileHash-MD5": 656,
            "FileHash-SHA256": 8455,
            "hostname": 2605,
            "email": 3,
            "URL": 5548,
            "CVE": 12
          },
          "indicator_count": 20377,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "878 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "0-1.duckdns.org [malicious]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "104.200.22.130 Command and Control",
        "http://fireeyei.iowa.gov/",
        "https://pin.it/ [SQLi Dumper]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "nr-data.net   (Apple Private Data Collection)",
        "init-p01st.push.apple.com",
        "nr-data.net [ Hidden private Apple data collection]",
        "aig.com",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "msftconnecttest.com",
        "http://michaela.young@uchealth.com/",
        "103.224.212.34 scanning_host",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "tulach.cc [Adversarial Malware Attack Source]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "http://uchealth.com/physician/frank-avilucea/",
        "abc7news.com",
        "apple-dns.net.   [Apple email collection]",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "newrelic.se    [Apple Collection]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Apple malware",
            "Tsara brashears",
            "Formbook",
            "Facebook ht",
            "Driverreviver",
            "Trickbot - s0266",
            "Death bitches",
            "Dapato",
            "Tulach malware",
            "Bit rat",
            "Gootloader",
            "Chaos",
            "Generic",
            "Zbot",
            "Gc",
            "Crack",
            "Networm",
            "O.gen",
            "Kryptik",
            "Emotet",
            "Lockbit",
            "Xrat",
            "Webtoolbar",
            "Dark power",
            "Cve jar",
            "Maui ransomware",
            "Remcos",
            "Keylogger",
            "Fonepaw",
            "Trojanspy",
            "Daisy coleman",
            "Fusioncore",
            "T",
            "Azorult",
            "Vidar",
            "Trojan:win32/detplock",
            "Quasar",
            "Swisyn",
            "Redline",
            "Qakbot - s0650",
            "Amazon aes",
            "Agent tesla - s0331",
            "Dnspionage",
            "Pwndlocker",
            "Qakbot",
            "Maltiverse",
            "Twitter malware",
            "Quasar rat",
            "Lolkek",
            "Artemis",
            "Ransomexx",
            "Et",
            "Raccoon"
          ],
          "industries": [
            "Health",
            "Government",
            "Defense"
          ],
          "unique_indicators": 143993
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/globalsign.com.au",
    "whois": "http://whois.domaintools.com/globalsign.com.au",
    "domain": "globalsign.com.au",
    "hostname": "www.globalsign.com.au"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 40,
  "pulses": [
    {
      "id": "65afcb842689eb776c0737e5",
      "name": "Maui Ransomware",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-23T14:21:56.725000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aab8eb55243c504a2cb4c0",
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aab8eb55243c504a2cb4c0",
      "name": "Maui Ransomware",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-19T18:01:15.365000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65a9b4296442cc8db50a264f",
      "export_count": 44,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a9b87d2d435bdad9ce80a3",
      "name": "Racoon Stealer ",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-18T23:47:09.818000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65a9b4296442cc8db50a264f",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a9b4296442cc8db50a264f",
      "name": "Maui Ransomware ",
      "description": "",
      "modified": "2024-02-17T23:00:21.788000",
      "created": "2024-01-18T23:28:41.569000",
      "tags": [
        "first",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "namecheap",
        "server",
        "registrar abuse",
        "code",
        "namecheap inc",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "win32 exe",
        "win32 dll",
        "type name",
        "user",
        "dns replication",
        "description",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "community https",
        "urls",
        "amazonaes",
        "china telecom",
        "sector",
        "export",
        "cloud",
        "mb opera",
        "mb iesettings",
        "kb acrotray",
        "installer",
        "samplepath",
        "ssl certificate",
        "whois record",
        "tsara brashears",
        "apple ios",
        "p2404",
        "malware",
        "apple",
        "password",
        "critical risk",
        "password bypass",
        "core",
        "hacktool",
        "metro",
        "download",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "emotet",
        "tulach",
        "tulach.cc",
        "united",
        "heur",
        "team",
        "firehol",
        "malware site",
        "cyber threat",
        "malicious site",
        "phishing",
        "phishing site",
        "malicious",
        "downer",
        "artemis",
        "dnspionage",
        "kuaizip",
        "fusioncore",
        "softcnapp",
        "downloader",
        "trojan",
        "zbot",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "maltiverse",
        "phishtank",
        "bank",
        "unsafe",
        "riskware",
        "alexa",
        "service",
        "facebook",
        "presenoker",
        "agent",
        "stealer",
        "phish",
        "union",
        "azorult",
        "runescape",
        "generic",
        "crack",
        "dapato",
        "iframe",
        "downldr",
        "vidar",
        "raccoon",
        "remcos",
        "miner",
        "agenttesla",
        "unknown",
        "detplock",
        "networm",
        "win64",
        "trickbot",
        "telecom",
        "media",
        "webtoolbar",
        "trojanspy",
        "no data",
        "tag count",
        "tld count",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist https",
        "pattern match",
        "samuel tulach",
        "file",
        "localappdata",
        "ascii text",
        "title",
        "windows",
        "hyperv",
        "span",
        "mitre att",
        "meta",
        "path",
        "light",
        "dark",
        "vmprotect",
        "main",
        "footer",
        "body",
        "class",
        "hybrid",
        "accept",
        "local",
        "click",
        "strings",
        "error",
        "script",
        "form",
        "root ca",
        "textarea",
        "github",
        "input",
        "trust",
        "general",
        "june",
        "threat roundup",
        "july",
        "whois whois",
        "collection",
        "august",
        "lolkek",
        "ransomware",
        "ursnif",
        "lockbit",
        "chaos",
        "quasar",
        "april",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "cobalt strike",
        "attack",
        "bitrat",
        "formbook",
        "qakbot",
        "ransomexx",
        "gootloader",
        "maui ransomware",
        "Cobalt Strike",
        "physical threat",
        "target",
        "contacted circa 10.23.2023-"
      ],
      "references": [
        "tulach.cc [Adversarial Malware Attack Source]",
        "http://1.116.132.182/weblogic_CVE_2020_2551.jar",
        "init-p01st.push.apple.com",
        "newrelic.se    [Apple Collection]",
        "apple-dns.net.   [Apple email collection]",
        "apple.com [=vaccine.com / negative http or https - insecure, malicious]",
        "nr-data.net [ Hidden private Apple data collection]",
        "http://dm.kaspersky-labs.com/en/KIS/21.2.16.590/ksde_ksn_en.txt [=apple.com/bag]",
        "www.metrobyt-mobile.com.  [s3.amazonnaws.com Apple]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign =Tulach abuse]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [Target - prism.exe , phishing, NSA current, former, wannabe?] Not classified it's widespread.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ password cracker, Mail spammer, malicious advertising]",
        "https://mobile.twitter.com/hashtag/daisycoleman [Troubling Catherine Daisy Coleman DEFAULT Twitter] Coleman's alleged suicide note Twitter",
        "114.114.114.114  [IP, subnet? Attacked my devices with dumping campaign. Revenge]",
        "mobile.twitter.com [titled hashtag Daisy Coleman]",
        "http://pingma.qq.com/mstat/report/?index=1569424777 [malicious Daisy Coleman link]",
        "12 CVE exploits posted in 'scoreblue' CVE tally",
        "Hybrid Analysis, wTools, VT, Deep Search and related online research. Yes I'm a frightened underdog advocate, educated & trained in many areas.THIS!",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "Above Assurant link. [ Hidden privacy threats,,Transactional campaign",
        "https://pin.it/ [SQLi Dumper]",
        "https://github.com/dyne/domain-list/blob/master/data/nsa = msftncsci.com/ncsi.txt",
        "msftconnecttest.com",
        "ncsi-geo.trafficmanager.net =analytics.tresensa.com",
        "https://www.msn.com/?ocid=wispr&pc=u477 [msftconnecttest.com/redirect malicious. [Remote Network Attack via devices]",
        "104.200.22.130 Command and Control",
        "aig.com",
        "https://github-cloud.s3.amazonaws.com [DNS prefetch]",
        "fed1a186b37f4720s@withheldforprivacy.com [Investigation of alleged victims?]",
        "103.224.212.34 scanning_host",
        "0-1.duckdns.org [malicious]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tsara Brashears",
          "display_name": "Tsara Brashears",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Daisy Coleman",
          "display_name": "Daisy Coleman",
          "target": null
        },
        {
          "id": "Twitter Malware",
          "display_name": "Twitter Malware",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "CVE JAR",
          "display_name": "CVE JAR",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Death Bitches",
          "display_name": "Death Bitches",
          "target": null
        },
        {
          "id": "Bit RAT",
          "display_name": "Bit RAT",
          "target": null
        },
        {
          "id": "Swisyn",
          "display_name": "Swisyn",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Fusioncore",
          "display_name": "Fusioncore",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "GootLoader",
          "display_name": "GootLoader",
          "target": null
        },
        {
          "id": "Raccoon",
          "display_name": "Raccoon",
          "target": null
        },
        {
          "id": "Crack",
          "display_name": "Crack",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Apple Malware",
          "display_name": "Apple Malware",
          "target": null
        },
        {
          "id": "FonePaw",
          "display_name": "FonePaw",
          "target": null
        },
        {
          "id": "Amazon AES",
          "display_name": "Amazon AES",
          "target": null
        },
        {
          "id": "Facebook HT",
          "display_name": "Facebook HT",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "Agent Tesla - S0331",
          "display_name": "Agent Tesla - S0331",
          "target": null
        },
        {
          "id": "Networm",
          "display_name": "Networm",
          "target": null
        },
        {
          "id": "Dapato",
          "display_name": "Dapato",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "DNSpionage",
          "display_name": "DNSpionage",
          "target": null
        },
        {
          "id": "Trojan:Win32/Detplock",
          "display_name": "Trojan:Win32/Detplock",
          "target": "/malware/Trojan:Win32/Detplock"
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        },
        {
          "id": "PwndLocker",
          "display_name": "PwndLocker",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653977171f690fb9ab978bf3",
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 641,
        "domain": 2470,
        "FileHash-MD5": 656,
        "FileHash-SHA256": 8634,
        "hostname": 2629,
        "email": 4,
        "URL": 5605,
        "CVE": 12
      },
      "indicator_count": 20651,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659d687f92ebb4f3d613ae0c",
      "name": "Mimikatz | www.ssc.spaceforce.mil ",
      "description": "",
      "modified": "2024-01-09T15:38:39.547000",
      "created": "2024-01-09T15:38:39.547000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655cd0f065d2e5a6c92369e5",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "832 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9a1c71847ed3f62bca19",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T02:44:44.329000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 58,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656457d8dfbb95a0be58b263",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-11-27T08:48:22.997000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 76,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aa406d0b8009df583c87c",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T03:27:02.624000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 60,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9b46382eefe9b0acda21",
      "name": "http://fireeyei.iowa.gov/",
      "description": "",
      "modified": "2023-12-26T23:03:25.397000",
      "created": "2023-12-02T02:49:42.129000",
      "tags": [
        "passive dns",
        "urls",
        "scan endpoints",
        "pulse pulses",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "script",
        "beginstring",
        "severity",
        "null",
        "unknown",
        "date",
        "error",
        "refresh",
        "span",
        "class",
        "generator",
        "critical",
        "tools",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "referrer",
        "resolutions",
        "contacted",
        "historical",
        "communicating",
        "whois whois",
        "siblings",
        "execution",
        "united",
        "malware",
        "phishing site",
        "malicious site",
        "malware site",
        "ibm xforce",
        "exchange",
        "mail spammer",
        "firehol",
        "phishing",
        "fuery",
        "unsafe",
        "rostpay",
        "wacatac",
        "genkryptik",
        "riskware",
        "artemis",
        "qakbot",
        "asyncrat",
        "cobalt strike",
        "team",
        "installcore",
        "generic malware",
        "keylogger",
        "downloader",
        "tag count",
        "mon feb",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "blacklist https",
        "productidis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "heur",
        "filerepmalware",
        "seraph",
        "webcompanion",
        "redline stealer",
        "opencandy",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "maltiverse",
        "site top",
        "site safe",
        "malicious",
        "cve201711882",
        "phish",
        "driverreviver",
        "o.gen",
        "redline",
        "blacklist http",
        "microsoft",
        "detection list",
        "blacklist",
        "south carolina",
        "union",
        "traffic",
        "node tcp",
        "spammer",
        "tor known",
        "tor relayrouter",
        "host"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "O.gen",
          "display_name": "O.gen",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65642d43a6029c41643dfb5e",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 816,
        "hostname": 1542,
        "URL": 5023,
        "FileHash-SHA256": 1827,
        "FileHash-MD5": 786,
        "FileHash-SHA1": 403,
        "CVE": 4
      },
      "indicator_count": 10401,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65642d43a6029c41643dfb5e",
      "name": "http://fireeyei.iowa.gov/",
      "description": "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
      "modified": "2023-12-26T23:03:25.397000",
      "created": "2023-11-27T05:46:43.630000",
      "tags": [
        "passive dns",
        "urls",
        "scan endpoints",
        "pulse pulses",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "script",
        "beginstring",
        "severity",
        "null",
        "unknown",
        "date",
        "error",
        "refresh",
        "span",
        "class",
        "generator",
        "critical",
        "tools",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "referrer",
        "resolutions",
        "contacted",
        "historical",
        "communicating",
        "whois whois",
        "siblings",
        "execution",
        "united",
        "malware",
        "phishing site",
        "malicious site",
        "malware site",
        "ibm xforce",
        "exchange",
        "mail spammer",
        "firehol",
        "phishing",
        "fuery",
        "unsafe",
        "rostpay",
        "wacatac",
        "genkryptik",
        "riskware",
        "artemis",
        "qakbot",
        "asyncrat",
        "cobalt strike",
        "team",
        "installcore",
        "generic malware",
        "keylogger",
        "downloader",
        "tag count",
        "mon feb",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "blacklist https",
        "productidis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "heur",
        "filerepmalware",
        "seraph",
        "webcompanion",
        "redline stealer",
        "opencandy",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "maltiverse",
        "site top",
        "site safe",
        "malicious",
        "cve201711882",
        "phish",
        "driverreviver",
        "o.gen",
        "redline",
        "blacklist http",
        "microsoft",
        "detection list",
        "blacklist",
        "south carolina",
        "union",
        "traffic",
        "node tcp",
        "spammer",
        "tor known",
        "tor relayrouter",
        "host"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "O.gen",
          "display_name": "O.gen",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 816,
        "hostname": 1542,
        "URL": 5023,
        "FileHash-SHA256": 1827,
        "FileHash-MD5": 786,
        "FileHash-SHA1": 403,
        "CVE": 4
      },
      "indicator_count": 10401,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "845 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.globalsign.com.au",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.globalsign.com.au",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776699987.659775
}