{
  "type": "URL",
  "indicator": "https://www.globalsign.fr",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.globalsign.fr",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3777715375,
      "indicator": "https://www.globalsign.fr",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 26,
      "pulses": [
        {
          "id": "659d687f92ebb4f3d613ae0c",
          "name": "Mimikatz | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2024-01-09T15:38:39.547000",
          "created": "2024-01-09T15:38:39.547000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "831 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa27f81a9096f5889a9d0",
          "name": "WebToolbar | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-12-02T03:20:31.494000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655ce5116519bd86d1f1bdee",
          "name": "FormBook | www.ssc.spaceforce.mil 'Hoax' | Spyware | Fraud Services",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T17:12:49.783000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655cd0f065d2e5a6c92369e5",
          "name": "www.ssc.spaceforce.mil",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T15:46:56.740000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9c2eeebaf7b69d0e12ba",
          "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
          "description": "",
          "modified": "2023-12-20T17:01:34.161000",
          "created": "2023-12-02T02:53:34.585000",
          "tags": [
            "safe site",
            "million",
            "cisco umbrella",
            "alexa top",
            "site",
            "tag count",
            "tld count",
            "jul jan",
            "team alexa",
            "count blacklist",
            "maltiverse",
            "redirme",
            "cronup threat",
            "intel malware",
            "malicious site",
            "malware",
            "no data",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "engineering",
            "team",
            "malware site",
            "covid19",
            "phishing site",
            "phishing",
            "phishtank",
            "bank",
            "zbot",
            "malicious",
            "download",
            "suppobox",
            "zeus",
            "nymaim",
            "matsnu",
            "artemis",
            "virut",
            "panama",
            "smsspy",
            "cobalt strike",
            "emotet",
            "bradesco",
            "stealer",
            "facebook",
            "service",
            "simda",
            "runescape",
            "cutwail",
            "unruy",
            "bandoo",
            "tinba",
            "pykspa",
            "domaiq",
            "ave maria",
            "citadel",
            "pony",
            "keitaro",
            "ponmocup",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "sha256",
            "sha1",
            "ascii text",
            "date",
            "unknown",
            "body",
            "error",
            "class",
            "generator",
            "critical",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "malicious url",
            "union",
            "unsafe",
            "node tcp",
            "traffic",
            "tor known",
            "tor relayrouter",
            "spammer",
            "threats et",
            "ssl certificate",
            "contacted",
            "whois record",
            "whois whois",
            "historical ssl",
            "apple ios",
            "resolutions",
            "bundled",
            "referrer",
            "collections",
            "android",
            "banker",
            "keylogger",
            "generic malware",
            "generic",
            "blacklist http",
            "ac32a",
            "heur",
            "alexa",
            "xtrat",
            "iframe",
            "installcore",
            "win64",
            "crack",
            "xrat",
            "nircmd",
            "swrort",
            "agent",
            "filetour",
            "cleaner",
            "patcher",
            "adload",
            "wacatac",
            "riskware",
            "acint",
            "conduit",
            "fakealert",
            "opencandy",
            "xtreme",
            "downldr",
            "outbreak",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "installpack",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "presenoker",
            "fusioncore",
            "exploit",
            "filerepmetagen",
            "download json",
            "hostname",
            "hostnames",
            "mail spammer",
            "anonymizer",
            "firehol proxy",
            "asyncrat",
            "genkryptik",
            "fuery",
            "webtoolbar",
            "trojanspy",
            "dropped",
            "execution",
            "contacted urls",
            "http spammer",
            "host",
            "ip address",
            "site top",
            "site safe",
            "blacklist https",
            "tsara brashears",
            "kgs0",
            "kls0",
            "critical risk",
            "attack",
            "hacktool",
            "installer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Latvia",
            "Poland",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655b9a90e44a70d0fbbde981",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1117,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3426,
            "domain": 977,
            "hostname": 2269,
            "URL": 5554,
            "CVE": 23,
            "URI": 8,
            "Mutex": 1
          },
          "indicator_count": 14039,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655b9a90e44a70d0fbbde981",
          "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
          "description": "Domain stated ' SEIZED' by Departing Homeland Security\nSeizure links below seem a bit questionable: \n\nhttp://server3.elgenero.com/iprc_seized_banner.png\nhttp://kickass.to/IPRC_Seized_2016_kat.jpg\nhttp://kickass.to/the-adventures-of-tom-sawyer-t2068537.html\t\nhttp://bludv.tv/iprc_seized_banner.png\nhttp://z-lib.org/iprc_seized_banner.png\nIPRC_Seized_2016_kat.jpg\n... just banners? Moved and continue? Okay.\nListed below also listed in seized domain. Domains,URL's and Botnetwork Hosts still seem to exist.\nhttp://alohatube.xyz/search/tsara-brashears\nalohatube.xyz\nhttps://alohatube.xyz/search/tsara-brashears\nhttps://www.anyxxxtube.net/search-porn/tsara-brashears/\nhttp://45.159.189.105/bot/regex\t\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbia\t\nnr-data.net",
          "modified": "2023-12-20T17:01:34.161000",
          "created": "2023-11-20T17:42:40.771000",
          "tags": [
            "safe site",
            "million",
            "cisco umbrella",
            "alexa top",
            "site",
            "tag count",
            "tld count",
            "jul jan",
            "team alexa",
            "count blacklist",
            "maltiverse",
            "redirme",
            "cronup threat",
            "intel malware",
            "malicious site",
            "malware",
            "no data",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "engineering",
            "team",
            "malware site",
            "covid19",
            "phishing site",
            "phishing",
            "phishtank",
            "bank",
            "zbot",
            "malicious",
            "download",
            "suppobox",
            "zeus",
            "nymaim",
            "matsnu",
            "artemis",
            "virut",
            "panama",
            "smsspy",
            "cobalt strike",
            "emotet",
            "bradesco",
            "stealer",
            "facebook",
            "service",
            "simda",
            "runescape",
            "cutwail",
            "unruy",
            "bandoo",
            "tinba",
            "pykspa",
            "domaiq",
            "ave maria",
            "citadel",
            "pony",
            "keitaro",
            "ponmocup",
            "ransomware",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "sha256",
            "sha1",
            "ascii text",
            "date",
            "unknown",
            "body",
            "error",
            "class",
            "generator",
            "critical",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "malicious url",
            "union",
            "unsafe",
            "node tcp",
            "traffic",
            "tor known",
            "tor relayrouter",
            "spammer",
            "threats et",
            "ssl certificate",
            "contacted",
            "whois record",
            "whois whois",
            "historical ssl",
            "apple ios",
            "resolutions",
            "bundled",
            "referrer",
            "collections",
            "android",
            "banker",
            "keylogger",
            "generic malware",
            "generic",
            "blacklist http",
            "ac32a",
            "heur",
            "alexa",
            "xtrat",
            "iframe",
            "installcore",
            "win64",
            "crack",
            "xrat",
            "nircmd",
            "swrort",
            "agent",
            "filetour",
            "cleaner",
            "patcher",
            "adload",
            "wacatac",
            "riskware",
            "acint",
            "conduit",
            "fakealert",
            "opencandy",
            "xtreme",
            "downldr",
            "outbreak",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "installpack",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "presenoker",
            "fusioncore",
            "exploit",
            "filerepmetagen",
            "download json",
            "hostname",
            "hostnames",
            "mail spammer",
            "anonymizer",
            "firehol proxy",
            "asyncrat",
            "genkryptik",
            "fuery",
            "webtoolbar",
            "trojanspy",
            "dropped",
            "execution",
            "contacted urls",
            "http spammer",
            "host",
            "ip address",
            "site top",
            "site safe",
            "blacklist https",
            "tsara brashears",
            "kgs0",
            "kls0",
            "critical risk",
            "attack",
            "hacktool",
            "installer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Latvia",
            "Poland",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1117,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3426,
            "domain": 977,
            "hostname": 2269,
            "URL": 5554,
            "CVE": 23,
            "URI": 8,
            "Mutex": 1
          },
          "indicator_count": 14039,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655a13e4538e896c00f2077e",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "This report is generated by MITRE ATT&CK\u2122 and produced by the team at the University of California, San Francisco, and is available on the web, via the Microsoft Research website.\nTulach, 114.114.114.114, spyware, phishing, fraud, malvertizing, password cracker, iPhone unlocker, malicious, media sharing, miscellaneous attacks.",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-19T13:55:48.898000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "852 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655af35616dbd4781c681948",
          "name": "Spyware: http://browser.events.data.microsoftstart.cn",
          "description": "",
          "modified": "2023-12-19T13:01:12.394000",
          "created": "2023-11-20T05:49:10.586000",
          "tags": [
            "linkid246338",
            "whois record",
            "ssl certificate",
            "contacted",
            "execution",
            "historical ssl",
            "whois whois",
            "communicating",
            "resolutions",
            "referrer",
            "random",
            "august",
            "lockbit",
            "attack",
            "core",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "done adding",
            "catalog file",
            "authority",
            "class",
            "mitre att",
            "script",
            "temp",
            "ascii text",
            "date",
            "unknown",
            "service",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "local",
            "click",
            "strings",
            "threat roundup"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655a13e4538e896c00f2077e",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 34,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 2526,
            "URL": 3515,
            "domain": 458,
            "hostname": 1092
          },
          "indicator_count": 7653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "852 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655aef8a8cc2e0929f2aa5ea",
          "name": "Python Initiated Connection | Spyware | Remote Attacks |",
          "description": "",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-20T05:32:58.400000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655950034e6ae4650a6b02ce",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655950034e6ae4650a6b02ce",
          "name": "Python Initiated Connection | Spyware |  Remote Attacks  |  | Part 4",
          "description": "Apple, Mac, iOS, phishing, frauds services, malware, trojan.allesgreh/trojan.allesgreh/respat, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and possibly others. Python Initiated Connection, WScriptShell_Case_Anomaly.\nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T23:03:18.732000",
          "created": "2023-11-19T00:00:03.258000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et",
            "october",
            "contacted",
            "threat roundup",
            "january",
            "cyberstalking",
            "attack",
            "icmp",
            "banker",
            "keylogger",
            "google llc",
            "gc abuse",
            "orgid",
            "direct",
            "whois lookup",
            "netrange",
            "nethandle",
            "net34",
            "net340000",
            "googl2",
            "comment",
            "gc",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "driver pro",
            "files",
            "detections type",
            "name",
            "optimizer pro",
            "javascript",
            "text",
            "text ip",
            "aacr",
            "type name",
            "email",
            "email delivery",
            "email fwd",
            "delivery status",
            "notification",
            "name verdict",
            "runtime process",
            "sha1",
            "size",
            "localappdata",
            "temp",
            "prefetch8",
            "unicode text",
            "type data",
            "programfiles",
            "win64",
            "hybrid",
            "click",
            "strings",
            "youth",
            "pe resource",
            "apple private",
            "data collection",
            "hidden privacy",
            "threats https",
            "legal",
            "amazon aws",
            "wife happy",
            "vhash",
            "authentihash",
            "ssdeep",
            "file type",
            "magic pe32",
            "intel",
            "ms windows",
            "trid windows",
            "os2 executable",
            "compiler",
            "delphi",
            "sections",
            "md5 code",
            "data",
            "children",
            "file size",
            "dropped files",
            "google update",
            "setup sha256",
            "kb file"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12901,
            "hostname": 4445,
            "domain": 3685,
            "FileHash-MD5": 197,
            "FileHash-SHA256": 5136,
            "FileHash-SHA1": 170,
            "CIDR": 1,
            "email": 2,
            "CVE": 4
          },
          "indicator_count": 26541,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b4d8c905f4475d8bcc",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:32.856000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655907b9da2479892590b77a",
          "name": "Apple iOS Spyware |  Remote Attacks  | Fraud Services | Part 3",
          "description": "Apple, Mac, iOS, phishing, frauds, malware, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and probably others. \nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
          "modified": "2023-12-18T16:03:26.037000",
          "created": "2023-11-18T18:51:37.411000",
          "tags": [
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "contenttype",
            "phpsessid",
            "cisco umbrella",
            "alexa top",
            "million",
            "safe site",
            "site",
            "whois record",
            "ssl certificate",
            "execution",
            "dropped",
            "whois whois",
            "historical ssl",
            "copy",
            "tsara brashears",
            "communicating",
            "referrer",
            "cobalt strike",
            "hacktool",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "relic",
            "monitoring",
            "installer",
            "android",
            "agent tesla",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8650,
            "hostname": 3073,
            "domain": 2708,
            "FileHash-MD5": 118,
            "FileHash-SHA256": 3552,
            "FileHash-SHA1": 104
          },
          "indicator_count": 18205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655689e7e3250ae1a6a9be2f",
          "name": "t.call | https://www.milehighmedia.com/legal/2257 (phishing)",
          "description": "",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-16T21:30:15.183000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65552550c406412cd83dec6f",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568a146bed0e035fee11e7",
          "name": "Threat Network",
          "description": "",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-16T21:31:00.134000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65552832e2ebc1d277d13420",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65552832e2ebc1d277d13420",
          "name": "Threat Network",
          "description": "Malvertizing,\nt.call,  \nHello,\nhttps://www.milehighmedia.com/legal/2257,\nphishing,\ntrojanspyware,\nmonitoring,\nhttps://to.hofer.at/iphone,\nNXDOMAIN",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-15T20:21:06.879000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65552550c406412cd83dec6f",
          "name": "t.call | https://www.milehighmedia.com/legal/2257 (phishing)",
          "description": "Malvertizing\nt.call\nhttps://www.milehighmedia.com/legal/2257 (T Brazzers| Phishing)\nphishing\ntrojanspyware\nmonitoring",
          "modified": "2023-12-15T19:02:53.792000",
          "created": "2023-11-15T20:08:48.881000",
          "tags": [
            "a nxdomain",
            "unknown",
            "dns show",
            "search",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "contacted",
            "pe resource",
            "isadmin",
            "collections",
            "neural netw",
            "problems",
            "threat network",
            "infrastructure",
            "referrer",
            "ads into",
            "javascript",
            "javascript http",
            "win32 exe",
            "type name"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 260,
            "hostname": 331,
            "URL": 904,
            "FileHash-MD5": 67,
            "FileHash-SHA1": 47,
            "FileHash-SHA256": 1533
          },
          "indicator_count": 3142,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568ab12429c394dc4b91ea",
          "name": "iOS Unlocker| Apple | ATT | Monitoring| http://mobile.suddenlink2go",
          "description": "",
          "modified": "2023-12-14T15:03:30.417000",
          "created": "2023-11-16T21:33:37.838000",
          "tags": [
            "united",
            "blacklist",
            "malicious site",
            "mail spammer",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "malware",
            "phishing site",
            "heur",
            "malware site",
            "alexa top",
            "million",
            "unsafe",
            "artemis",
            "riskware",
            "conduit",
            "agent",
            "opencandy",
            "xtrat",
            "iframe",
            "cleaner",
            "team",
            "installpack",
            "xrat",
            "tiggre",
            "presenoker",
            "fusioncore",
            "wacatac",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "crack",
            "softcnapp",
            "trojanspy",
            "maltiverse",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "authority",
            "class",
            "script",
            "ascii text",
            "mitre att",
            "localappdata",
            "temp",
            "ck id",
            "date",
            "unknown",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "expiressun",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "pt3uc1",
            "path",
            "movies",
            "watch",
            "html info",
            "meta tags",
            "suddenlink tv",
            "trackers amazon",
            "pt3rc1",
            "whois record",
            "whois whois",
            "ssl certificate",
            "historical",
            "historical ssl",
            "referrer",
            "communicating",
            "dropped",
            "contacted",
            "apple ios",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "attack",
            "awful",
            "brian sabey",
            "aig",
            "civicaIg",
            "tracking",
            "password crack",
            "tulach",
            "target tsara brashears",
            "tylerknott",
            "att",
            "monitoring",
            "spyware",
            "spying",
            "cybercrime",
            "tulach",
            "hughesnet",
            "ios",
            "toshiba",
            "attack",
            "malvertizing",
            "cyber stalking",
            "porn",
            "pornhub"
          ],
          "references": [
            "http://mobile.suddenlink2go.com/",
            "https://hybrid-analysis.com/sample/889790f55a8a29ee75463bbcf014c3ed6cc76e6cd0278e491ec9fa1ed14862c4/655374e9921d5d73860b7db3",
            "https://applemusic-spotlight.myunidays.com/US/en-US?",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "myhughesnet.com",
            "dishmail.net",
            "home.toshiba.com",
            "ytq2rs56.haogfw.com",
            "pornhub.com",
            "http://trk.brother-root-rich-of.xyz/campaign?id=4f1426e9-22f8-4e7a-9c32-1b2d42867559&var1=&extcid=w9A2DTCOAL56FRAK125KMLAI",
            "http://trk.reverseparameter.site/gg/izuyv?to=https://mine-top-gratis-application.pw/e29481e9-a792-46a8-bbf0-188ed2a816ae/f10439e6-e61a-4420-ba88-29e9d1c5d2ea?brand=Lenovo&btd=dHJrLm1vYmlsZXRvcDIwMTh0ZWNoaWUueHl6&exptoken=MTU1NzUxMjgzMjgyMw==&lang=ar&model=K6+Note&td=dHJrLnJldmVyc2VwYXJhbWV0ZXIuc2l0ZS9wcmNlZWQ",
            "monitor.cablelan.net",
            "https://monitor.rodgersmith.com",
            "https://www.everycloudtech.com/free-mail-flow-monitor"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6553b88c316cfb531b9c4c10",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 144,
            "FileHash-SHA1": 179,
            "FileHash-SHA256": 4528,
            "CVE": 7,
            "domain": 2024,
            "hostname": 3556,
            "URL": 10455
          },
          "indicator_count": 20893,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6553b88c316cfb531b9c4c10",
          "name": "iOS Unlocker| Apple | ATT | Monitoring| http://mobile.suddenlink2go.com",
          "description": "spyware, 114.114.114.114, Tulach, C2, apple iOS, passwords, crack, unlock , click, att, hughesnet",
          "modified": "2023-12-14T15:03:30.417000",
          "created": "2023-11-14T18:12:28.459000",
          "tags": [
            "united",
            "blacklist",
            "malicious site",
            "mail spammer",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "malware",
            "phishing site",
            "heur",
            "malware site",
            "alexa top",
            "million",
            "unsafe",
            "artemis",
            "riskware",
            "conduit",
            "agent",
            "opencandy",
            "xtrat",
            "iframe",
            "cleaner",
            "team",
            "installpack",
            "xrat",
            "tiggre",
            "presenoker",
            "fusioncore",
            "wacatac",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "crack",
            "softcnapp",
            "trojanspy",
            "maltiverse",
            "falcon sandbox",
            "pattern match",
            "root ca",
            "authority",
            "class",
            "script",
            "ascii text",
            "mitre att",
            "localappdata",
            "temp",
            "ck id",
            "date",
            "unknown",
            "generator",
            "critical",
            "error",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "expiressun",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "pt3uc1",
            "path",
            "movies",
            "watch",
            "html info",
            "meta tags",
            "suddenlink tv",
            "trackers amazon",
            "pt3rc1",
            "whois record",
            "whois whois",
            "ssl certificate",
            "historical",
            "historical ssl",
            "referrer",
            "communicating",
            "dropped",
            "contacted",
            "apple ios",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "attack",
            "awful",
            "brian sabey",
            "aig",
            "civicaIg",
            "tracking",
            "password crack",
            "tulach",
            "target tsara brashears",
            "tylerknott",
            "att",
            "monitoring",
            "spyware",
            "spying",
            "cybercrime",
            "tulach",
            "hughesnet",
            "ios",
            "toshiba",
            "attack",
            "malvertizing",
            "cyber stalking",
            "porn",
            "pornhub"
          ],
          "references": [
            "http://mobile.suddenlink2go.com/",
            "https://hybrid-analysis.com/sample/889790f55a8a29ee75463bbcf014c3ed6cc76e6cd0278e491ec9fa1ed14862c4/655374e9921d5d73860b7db3",
            "https://applemusic-spotlight.myunidays.com/US/en-US?",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "myhughesnet.com",
            "dishmail.net",
            "home.toshiba.com",
            "ytq2rs56.haogfw.com",
            "pornhub.com",
            "http://trk.brother-root-rich-of.xyz/campaign?id=4f1426e9-22f8-4e7a-9c32-1b2d42867559&var1=&extcid=w9A2DTCOAL56FRAK125KMLAI",
            "http://trk.reverseparameter.site/gg/izuyv?to=https://mine-top-gratis-application.pw/e29481e9-a792-46a8-bbf0-188ed2a816ae/f10439e6-e61a-4420-ba88-29e9d1c5d2ea?brand=Lenovo&btd=dHJrLm1vYmlsZXRvcDIwMTh0ZWNoaWUueHl6&exptoken=MTU1NzUxMjgzMjgyMw==&lang=ar&model=K6+Note&td=dHJrLnJldmVyc2VwYXJhbWV0ZXIuc2l0ZS9wcmNlZWQ",
            "monitor.cablelan.net",
            "https://monitor.rodgersmith.com",
            "https://www.everycloudtech.com/free-mail-flow-monitor"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 144,
            "FileHash-SHA1": 179,
            "FileHash-SHA256": 4528,
            "CVE": 7,
            "domain": 2024,
            "hostname": 3556,
            "URL": 10455
          },
          "indicator_count": 20893,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568d67bd96e06ab44b9b95",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-16T21:45:11.721000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65536bdc3676a40633a619be",
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bdc3676a40633a619be",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:45:16.667000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bc6301b7cdf7d04e095",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:44:54.422000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136b5eb9bdd21070ff9d7",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:41.263000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 70,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545be6e02e0f9f82cb1febf",
          "name": "Vawtrak credential stealer | CNC",
          "description": "",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-11-04T03:45:50.234000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65413ea960cc79abf6d446fb",
          "export_count": 86,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65413ea960cc79abf6d446fb",
          "name": "Vawtrak credential stealer | CNC",
          "description": "Cyber warfare\nTracking\nMonitoring\nMalvertizing\nCNC\nKeylogging\nBotNet\nSever Privacy Invasion",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:51:37.016000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 74,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c8e530066ae793dc64",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:18:00.623000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c1ac991f85328604d2",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:52.382000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://trk.reverseparameter.site/gg/izuyv?to=https://mine-top-gratis-application.pw/e29481e9-a792-46a8-bbf0-188ed2a816ae/f10439e6-e61a-4420-ba88-29e9d1c5d2ea?brand=Lenovo&btd=dHJrLm1vYmlsZXRvcDIwMTh0ZWNoaWUueHl6&exptoken=MTU1NzUxMjgzMjgyMw==&lang=ar&model=K6+Note&td=dHJrLnJldmVyc2VwYXJhbWV0ZXIuc2l0ZS9wcmNlZWQ",
        "https://applemusic-spotlight.myunidays.com/US/en-US?",
        "ytq2rs56.haogfw.com",
        "http://trk.brother-root-rich-of.xyz/campaign?id=4f1426e9-22f8-4e7a-9c32-1b2d42867559&var1=&extcid=w9A2DTCOAL56FRAK125KMLAI",
        "http://mobile.suddenlink2go.com/",
        "pornhub.com",
        "https://www.everycloudtech.com/free-mail-flow-monitor",
        "https://monitor.rodgersmith.com",
        "home.toshiba.com",
        "myhughesnet.com",
        "https://hybrid-analysis.com/sample/889790f55a8a29ee75463bbcf014c3ed6cc76e6cd0278e491ec9fa1ed14862c4/655374e9921d5d73860b7db3",
        "monitor.cablelan.net",
        "dishmail.net"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Webtoolbar",
            "Gc",
            "Generic",
            "Trojanspy",
            "Roblox",
            "Maltiverse",
            "Et"
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "unique_indicators": 109548
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/globalsign.fr",
    "whois": "http://whois.domaintools.com/globalsign.fr",
    "domain": "globalsign.fr",
    "hostname": "www.globalsign.fr"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 26,
  "pulses": [
    {
      "id": "659d687f92ebb4f3d613ae0c",
      "name": "Mimikatz | www.ssc.spaceforce.mil ",
      "description": "",
      "modified": "2024-01-09T15:38:39.547000",
      "created": "2024-01-09T15:38:39.547000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655cd0f065d2e5a6c92369e5",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "831 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aa27f81a9096f5889a9d0",
      "name": "WebToolbar | www.ssc.spaceforce.mil ",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-12-02T03:20:31.494000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655cd0f065d2e5a6c92369e5",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655ce5116519bd86d1f1bdee",
      "name": "FormBook | www.ssc.spaceforce.mil 'Hoax' | Spyware | Fraud Services",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-11-21T17:12:49.783000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655cd0f065d2e5a6c92369e5",
      "name": "www.ssc.spaceforce.mil",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-11-21T15:46:56.740000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9c2eeebaf7b69d0e12ba",
      "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
      "description": "",
      "modified": "2023-12-20T17:01:34.161000",
      "created": "2023-12-02T02:53:34.585000",
      "tags": [
        "safe site",
        "million",
        "cisco umbrella",
        "alexa top",
        "site",
        "tag count",
        "tld count",
        "jul jan",
        "team alexa",
        "count blacklist",
        "maltiverse",
        "redirme",
        "cronup threat",
        "intel malware",
        "malicious site",
        "malware",
        "no data",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "united",
        "cyber threat",
        "engineering",
        "team",
        "malware site",
        "covid19",
        "phishing site",
        "phishing",
        "phishtank",
        "bank",
        "zbot",
        "malicious",
        "download",
        "suppobox",
        "zeus",
        "nymaim",
        "matsnu",
        "artemis",
        "virut",
        "panama",
        "smsspy",
        "cobalt strike",
        "emotet",
        "bradesco",
        "stealer",
        "facebook",
        "service",
        "simda",
        "runescape",
        "cutwail",
        "unruy",
        "bandoo",
        "tinba",
        "pykspa",
        "domaiq",
        "ave maria",
        "citadel",
        "pony",
        "keitaro",
        "ponmocup",
        "ransomware",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "sha256",
        "sha1",
        "ascii text",
        "date",
        "unknown",
        "body",
        "error",
        "class",
        "generator",
        "critical",
        "meta",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "malicious url",
        "union",
        "unsafe",
        "node tcp",
        "traffic",
        "tor known",
        "tor relayrouter",
        "spammer",
        "threats et",
        "ssl certificate",
        "contacted",
        "whois record",
        "whois whois",
        "historical ssl",
        "apple ios",
        "resolutions",
        "bundled",
        "referrer",
        "collections",
        "android",
        "banker",
        "keylogger",
        "generic malware",
        "generic",
        "blacklist http",
        "ac32a",
        "heur",
        "alexa",
        "xtrat",
        "iframe",
        "installcore",
        "win64",
        "crack",
        "xrat",
        "nircmd",
        "swrort",
        "agent",
        "filetour",
        "cleaner",
        "patcher",
        "adload",
        "wacatac",
        "riskware",
        "acint",
        "conduit",
        "fakealert",
        "opencandy",
        "xtreme",
        "downldr",
        "outbreak",
        "iobit",
        "rostpay",
        "dropper",
        "mediaget",
        "installpack",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "presenoker",
        "fusioncore",
        "exploit",
        "filerepmetagen",
        "download json",
        "hostname",
        "hostnames",
        "mail spammer",
        "anonymizer",
        "firehol proxy",
        "asyncrat",
        "genkryptik",
        "fuery",
        "webtoolbar",
        "trojanspy",
        "dropped",
        "execution",
        "contacted urls",
        "http spammer",
        "host",
        "ip address",
        "site top",
        "site safe",
        "blacklist https",
        "tsara brashears",
        "kgs0",
        "kls0",
        "critical risk",
        "attack",
        "hacktool",
        "installer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Latvia",
        "Poland",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655b9a90e44a70d0fbbde981",
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1117,
        "FileHash-SHA1": 664,
        "FileHash-SHA256": 3426,
        "domain": 977,
        "hostname": 2269,
        "URL": 5554,
        "CVE": 23,
        "URI": 8,
        "Mutex": 1
      },
      "indicator_count": 14039,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "851 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655b9a90e44a70d0fbbde981",
      "name": "Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi",
      "description": "Domain stated ' SEIZED' by Departing Homeland Security\nSeizure links below seem a bit questionable: \n\nhttp://server3.elgenero.com/iprc_seized_banner.png\nhttp://kickass.to/IPRC_Seized_2016_kat.jpg\nhttp://kickass.to/the-adventures-of-tom-sawyer-t2068537.html\t\nhttp://bludv.tv/iprc_seized_banner.png\nhttp://z-lib.org/iprc_seized_banner.png\nIPRC_Seized_2016_kat.jpg\n... just banners? Moved and continue? Okay.\nListed below also listed in seized domain. Domains,URL's and Botnetwork Hosts still seem to exist.\nhttp://alohatube.xyz/search/tsara-brashears\nalohatube.xyz\nhttps://alohatube.xyz/search/tsara-brashears\nhttps://www.anyxxxtube.net/search-porn/tsara-brashears/\nhttp://45.159.189.105/bot/regex\t\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbia\t\nnr-data.net",
      "modified": "2023-12-20T17:01:34.161000",
      "created": "2023-11-20T17:42:40.771000",
      "tags": [
        "safe site",
        "million",
        "cisco umbrella",
        "alexa top",
        "site",
        "tag count",
        "tld count",
        "jul jan",
        "team alexa",
        "count blacklist",
        "maltiverse",
        "redirme",
        "cronup threat",
        "intel malware",
        "malicious site",
        "malware",
        "no data",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "united",
        "cyber threat",
        "engineering",
        "team",
        "malware site",
        "covid19",
        "phishing site",
        "phishing",
        "phishtank",
        "bank",
        "zbot",
        "malicious",
        "download",
        "suppobox",
        "zeus",
        "nymaim",
        "matsnu",
        "artemis",
        "virut",
        "panama",
        "smsspy",
        "cobalt strike",
        "emotet",
        "bradesco",
        "stealer",
        "facebook",
        "service",
        "simda",
        "runescape",
        "cutwail",
        "unruy",
        "bandoo",
        "tinba",
        "pykspa",
        "domaiq",
        "ave maria",
        "citadel",
        "pony",
        "keitaro",
        "ponmocup",
        "ransomware",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "sha256",
        "sha1",
        "ascii text",
        "date",
        "unknown",
        "body",
        "error",
        "class",
        "generator",
        "critical",
        "meta",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "malicious url",
        "union",
        "unsafe",
        "node tcp",
        "traffic",
        "tor known",
        "tor relayrouter",
        "spammer",
        "threats et",
        "ssl certificate",
        "contacted",
        "whois record",
        "whois whois",
        "historical ssl",
        "apple ios",
        "resolutions",
        "bundled",
        "referrer",
        "collections",
        "android",
        "banker",
        "keylogger",
        "generic malware",
        "generic",
        "blacklist http",
        "ac32a",
        "heur",
        "alexa",
        "xtrat",
        "iframe",
        "installcore",
        "win64",
        "crack",
        "xrat",
        "nircmd",
        "swrort",
        "agent",
        "filetour",
        "cleaner",
        "patcher",
        "adload",
        "wacatac",
        "riskware",
        "acint",
        "conduit",
        "fakealert",
        "opencandy",
        "xtreme",
        "downldr",
        "outbreak",
        "iobit",
        "rostpay",
        "dropper",
        "mediaget",
        "installpack",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "presenoker",
        "fusioncore",
        "exploit",
        "filerepmetagen",
        "download json",
        "hostname",
        "hostnames",
        "mail spammer",
        "anonymizer",
        "firehol proxy",
        "asyncrat",
        "genkryptik",
        "fuery",
        "webtoolbar",
        "trojanspy",
        "dropped",
        "execution",
        "contacted urls",
        "http spammer",
        "host",
        "ip address",
        "site top",
        "site safe",
        "blacklist https",
        "tsara brashears",
        "kgs0",
        "kls0",
        "critical risk",
        "attack",
        "hacktool",
        "installer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Latvia",
        "Poland",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 46,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1117,
        "FileHash-SHA1": 664,
        "FileHash-SHA256": 3426,
        "domain": 977,
        "hostname": 2269,
        "URL": 5554,
        "CVE": 23,
        "URI": 8,
        "Mutex": 1
      },
      "indicator_count": 14039,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "851 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655a13e4538e896c00f2077e",
      "name": "Spyware: http://browser.events.data.microsoftstart.cn",
      "description": "This report is generated by MITRE ATT&CK\u2122 and produced by the team at the University of California, San Francisco, and is available on the web, via the Microsoft Research website.\nTulach, 114.114.114.114, spyware, phishing, fraud, malvertizing, password cracker, iPhone unlocker, malicious, media sharing, miscellaneous attacks.",
      "modified": "2023-12-19T13:01:12.394000",
      "created": "2023-11-19T13:55:48.898000",
      "tags": [
        "linkid246338",
        "whois record",
        "ssl certificate",
        "contacted",
        "execution",
        "historical ssl",
        "whois whois",
        "communicating",
        "resolutions",
        "referrer",
        "random",
        "august",
        "lockbit",
        "attack",
        "core",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "root ca",
        "done adding",
        "catalog file",
        "authority",
        "class",
        "mitre att",
        "script",
        "temp",
        "ascii text",
        "date",
        "unknown",
        "service",
        "generator",
        "critical",
        "error",
        "meta",
        "hybrid",
        "local",
        "click",
        "strings",
        "threat roundup"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 34,
        "FileHash-SHA1": 28,
        "FileHash-SHA256": 2526,
        "URL": 3515,
        "domain": 458,
        "hostname": 1092
      },
      "indicator_count": 7653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "852 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655af35616dbd4781c681948",
      "name": "Spyware: http://browser.events.data.microsoftstart.cn",
      "description": "",
      "modified": "2023-12-19T13:01:12.394000",
      "created": "2023-11-20T05:49:10.586000",
      "tags": [
        "linkid246338",
        "whois record",
        "ssl certificate",
        "contacted",
        "execution",
        "historical ssl",
        "whois whois",
        "communicating",
        "resolutions",
        "referrer",
        "random",
        "august",
        "lockbit",
        "attack",
        "core",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "root ca",
        "done adding",
        "catalog file",
        "authority",
        "class",
        "mitre att",
        "script",
        "temp",
        "ascii text",
        "date",
        "unknown",
        "service",
        "generator",
        "critical",
        "error",
        "meta",
        "hybrid",
        "local",
        "click",
        "strings",
        "threat roundup"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655a13e4538e896c00f2077e",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 34,
        "FileHash-SHA1": 28,
        "FileHash-SHA256": 2526,
        "URL": 3515,
        "domain": 458,
        "hostname": 1092
      },
      "indicator_count": 7653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "852 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655aef8a8cc2e0929f2aa5ea",
      "name": "Python Initiated Connection | Spyware | Remote Attacks |",
      "description": "",
      "modified": "2023-12-18T23:03:18.732000",
      "created": "2023-11-20T05:32:58.400000",
      "tags": [
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "contenttype",
        "phpsessid",
        "cisco umbrella",
        "alexa top",
        "million",
        "safe site",
        "site",
        "whois record",
        "ssl certificate",
        "execution",
        "dropped",
        "whois whois",
        "historical ssl",
        "copy",
        "tsara brashears",
        "communicating",
        "referrer",
        "cobalt strike",
        "hacktool",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "relic",
        "monitoring",
        "installer",
        "android",
        "agent tesla",
        "et",
        "october",
        "contacted",
        "threat roundup",
        "january",
        "cyberstalking",
        "attack",
        "icmp",
        "banker",
        "keylogger",
        "google llc",
        "gc abuse",
        "orgid",
        "direct",
        "whois lookup",
        "netrange",
        "nethandle",
        "net34",
        "net340000",
        "googl2",
        "comment",
        "gc",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "driver pro",
        "files",
        "detections type",
        "name",
        "optimizer pro",
        "javascript",
        "text",
        "text ip",
        "aacr",
        "type name",
        "email",
        "email delivery",
        "email fwd",
        "delivery status",
        "notification",
        "name verdict",
        "runtime process",
        "sha1",
        "size",
        "localappdata",
        "temp",
        "prefetch8",
        "unicode text",
        "type data",
        "programfiles",
        "win64",
        "hybrid",
        "click",
        "strings",
        "youth",
        "pe resource",
        "apple private",
        "data collection",
        "hidden privacy",
        "threats https",
        "legal",
        "amazon aws",
        "wife happy",
        "vhash",
        "authentihash",
        "ssdeep",
        "file type",
        "magic pe32",
        "intel",
        "ms windows",
        "trid windows",
        "os2 executable",
        "compiler",
        "delphi",
        "sections",
        "md5 code",
        "data",
        "children",
        "file size",
        "dropped files",
        "google update",
        "setup sha256",
        "kb file"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "GC",
          "display_name": "GC",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655950034e6ae4650a6b02ce",
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12901,
        "hostname": 4445,
        "domain": 3685,
        "FileHash-MD5": 197,
        "FileHash-SHA256": 5136,
        "FileHash-SHA1": 170,
        "CIDR": 1,
        "email": 2,
        "CVE": 4
      },
      "indicator_count": 26541,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "853 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655950034e6ae4650a6b02ce",
      "name": "Python Initiated Connection | Spyware |  Remote Attacks  |  | Part 4",
      "description": "Apple, Mac, iOS, phishing, frauds services, malware, trojan.allesgreh/trojan.allesgreh/respat, spyware, Google abuse, used to obsessively spy and stalk SA victim Tsara Brashears and possibly others. Python Initiated Connection, WScriptShell_Case_Anomaly.\nPulse: http://secure-appleid-com-uh2hdgo2m7pjuusohde19c8tqs.sssa79.com/\n[Concerning Pre populated content: A security alert has been sent to a secure Apple account in the US, but what exactly is it and what does it mean? and how did it end up in this post-mortem?\u2190((threat?))Let me tell you a]",
      "modified": "2023-12-18T23:03:18.732000",
      "created": "2023-11-19T00:00:03.258000",
      "tags": [
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "contenttype",
        "phpsessid",
        "cisco umbrella",
        "alexa top",
        "million",
        "safe site",
        "site",
        "whois record",
        "ssl certificate",
        "execution",
        "dropped",
        "whois whois",
        "historical ssl",
        "copy",
        "tsara brashears",
        "communicating",
        "referrer",
        "cobalt strike",
        "hacktool",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "relic",
        "monitoring",
        "installer",
        "android",
        "agent tesla",
        "et",
        "october",
        "contacted",
        "threat roundup",
        "january",
        "cyberstalking",
        "attack",
        "icmp",
        "banker",
        "keylogger",
        "google llc",
        "gc abuse",
        "orgid",
        "direct",
        "whois lookup",
        "netrange",
        "nethandle",
        "net34",
        "net340000",
        "googl2",
        "comment",
        "gc",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "driver pro",
        "files",
        "detections type",
        "name",
        "optimizer pro",
        "javascript",
        "text",
        "text ip",
        "aacr",
        "type name",
        "email",
        "email delivery",
        "email fwd",
        "delivery status",
        "notification",
        "name verdict",
        "runtime process",
        "sha1",
        "size",
        "localappdata",
        "temp",
        "prefetch8",
        "unicode text",
        "type data",
        "programfiles",
        "win64",
        "hybrid",
        "click",
        "strings",
        "youth",
        "pe resource",
        "apple private",
        "data collection",
        "hidden privacy",
        "threats https",
        "legal",
        "amazon aws",
        "wife happy",
        "vhash",
        "authentihash",
        "ssdeep",
        "file type",
        "magic pe32",
        "intel",
        "ms windows",
        "trid windows",
        "os2 executable",
        "compiler",
        "delphi",
        "sections",
        "md5 code",
        "data",
        "children",
        "file size",
        "dropped files",
        "google update",
        "setup sha256",
        "kb file"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "GC",
          "display_name": "GC",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12901,
        "hostname": 4445,
        "domain": 3685,
        "FileHash-MD5": 197,
        "FileHash-SHA256": 5136,
        "FileHash-SHA1": 170,
        "CIDR": 1,
        "email": 2,
        "CVE": 4
      },
      "indicator_count": 26541,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "853 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.globalsign.fr",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.globalsign.fr",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642922.984143
}