{
  "type": "URL",
  "indicator": "https://www.micr0soft.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.micr0soft.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3819187867,
      "indicator": "https://www.micr0soft.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "6824aa10fa32899c33abc3be",
          "name": "tp://adorno.pl and http://vgt.pl INVESTIGATION requstor user Axelo",
          "description": "https://t.co/zTZNBTe8GV",
          "modified": "2025-06-14T00:00:30.956000",
          "created": "2025-05-14T14:34:56.497000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 426,
            "FileHash-SHA1": 455,
            "FileHash-SHA256": 5596,
            "URL": 15206,
            "IPv4": 409,
            "domain": 2473,
            "hostname": 5059,
            "CVE": 3
          },
          "indicator_count": 29627,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "309 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cd05cd3c9d0cc0b9ed215f",
          "name": "Emotet - https://www.gambinospizza.com | Brian Sabey \u2022 HallRender",
          "description": "\u2022Emotet botnets were observed dropping Trickbot to deliver ransomware payloads against some victims and Qakbot Trojans to steal banking credentials and data from other targets.\n\n\u2022Scammer 'Attorney' Brian Sabey | HallRender associated ; utilizes every form of social engineering to gain full access to phone numbers, email, banking,  network, relatives, contacts, PHI, PII, modifies services.\n.",
          "modified": "2024-04-15T08:03:32.381000",
          "created": "2024-02-14T18:26:21.427000",
          "tags": [
            "united",
            "unknown",
            "status",
            "sec ch",
            "as44273 host",
            "search",
            "aaaa",
            "showing",
            "ch ua",
            "record value",
            "ssl certificate",
            "threat roundup",
            "contacted",
            "communicating",
            "historical ssl",
            "referrer",
            "resolutions",
            "http",
            "execution",
            "gopher",
            "pattern match",
            "breakpoint",
            "command decode",
            "desktop",
            "base",
            "gambino",
            "pizza",
            "suricata ipv4",
            "mitre att",
            "date",
            "meta",
            "footer",
            "february",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "main",
            "brian sabey",
            "hallrender",
            "trojan",
            "worm",
            "frankfurt",
            "germany",
            "asn15169",
            "google",
            "asn16509",
            "amazon02",
            "asn396982",
            "kansas city",
            "franchise url",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "hash",
            "protocol h2",
            "asn13335",
            "cloudflarenet",
            "software",
            "domains",
            "hashes",
            "learn",
            "issues tab",
            "value",
            "variables",
            "typeof function",
            "topropertykey",
            "bricksintersect",
            "bricksfunction",
            "domainpath name",
            "request chain",
            "chain",
            "nl page",
            "url history",
            "javascript",
            "page url",
            "redirected",
            "poweshell",
            "bruschettab",
            "mobsterstageda",
            "calzonec",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "beefpizzac",
            "superitaliansub",
            "cname",
            "msie",
            "chrome",
            "asnone united",
            "as6336 turn",
            "nxdomain",
            "whitelisted",
            "creation date",
            "turn",
            "body",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "registrar abuse",
            "iana id",
            "registrar url",
            "registrar whois",
            "contact email",
            "registry domain",
            "contact phone",
            "dnssec",
            "code",
            "type name",
            "win32 exe",
            "recreation",
            "whois record",
            "infected",
            "page dow",
            "poser",
            "scammer",
            "security",
            "malvertizing",
            "betting",
            "illegal activity",
            "linux",
            "teen porn",
            "child exploitation",
            "script urls",
            "a domains",
            "as10796 charter",
            "find your",
            "next franchise",
            "x content",
            "backend",
            "as13768 aptum",
            "moved",
            "passive dns",
            "urls",
            "as2635",
            "as14061",
            "scan endpoints",
            "all octoseek",
            "url http",
            "pulse pulses",
            "ip address",
            "related nids",
            "files location",
            "date hash",
            "avast avg",
            "nastya",
            "entries",
            "emotet",
            "windows nt",
            "show",
            "etpro trojan",
            "channel",
            "artemis",
            "medium",
            "delete",
            "copy",
            "virustotal",
            "trojan",
            "write",
            "trojanproxy",
            "vipre",
            "panda",
            "malware",
            "malware infection",
            "dga",
            "algorithm generated domains",
            "command and control",
            "pe32 executable",
            "tag",
            "tagging",
            "porn tagging",
            "as3356 level",
            "tahoma arial",
            "servers",
            "as1136 kpn",
            "next",
            "et",
            "remote",
            "confirm http",
            "sectrack",
            "openssl",
            "fulldisc",
            "secunia",
            "confirm https",
            "openssl tls",
            "multiple",
            "remote",
            "misc https",
            "impact",
            "heartbleed",
            "external source",
            "name hyperlink",
            "hp hpsbmu02998",
            "hp hpsbmu03019",
            "hp hpsbmu03030",
            "hp hpsbmu03018",
            "title",
            "lowfi",
            "title error",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "mozilla",
            "720.282.2025",
            "masquerading",
            "ninite feb",
            "mtb feb",
            "telper",
            "trojandropper",
            "ninite",
            "create c",
            "read c",
            "default",
            "create",
            "unicode",
            "dock",
            "xport"
          ],
          "references": [
            "www.gambinospizza.com",
            "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
            "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
            "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
            "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
            "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
            "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
            "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
            "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
            "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
            "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
            "http://porn.toplistcreator.eu/in.php",
            "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
            "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10",
            "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
            "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
            "CVE-2014-0160 \u2022 CVE-2017-11882",
            "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
            "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "XLS:Nastya\\ [Trj]",
              "display_name": "XLS:Nastya\\ [Trj]",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Crypt4.YGM",
              "display_name": "Crypt4.YGM",
              "target": null
            },
            {
              "id": "ZBot",
              "display_name": "ZBot",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Heartbleed Bug",
              "display_name": "Heartbleed Bug",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 118,
            "FileHash-SHA1": 106,
            "domain": 3271,
            "hostname": 2451,
            "URL": 8652,
            "email": 8,
            "FileHash-SHA256": 3153,
            "CVE": 4
          },
          "indicator_count": 17763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "734 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c5e50dda752af9eab50933",
          "name": "Side 3 Studios Pegasus Attack Denver, Co \u2022 SkyNet BotNetwork",
          "description": "Pegasus abuse by an alleged legal team with the malware hosting DGA domain https://hallrender.com. Related to an ongoing attack by a M.Brian Sabey who has fixated on a non criminal target. It's frightening to see the carelessness of the Cellebrite tool at work. \nAccording to all written accounts Side 3 provides services to Grammy award winning, nominated and aspiring artists. If you're heard of them , they've recorded there. There is evidence of music file transfers possibly, illegally sold to well known artist. This may have been done without knowledge of studio representatives. More likely by a hacker who boldly informed.",
          "modified": "2024-03-10T08:03:07.690000",
          "created": "2024-02-09T08:40:45.976000",
          "tags": [
            "malware",
            "pegasus",
            "cellbrite",
            "targets sa",
            "survivor",
            "referrer",
            "contacted urls",
            "contacted",
            "whois record",
            "hr rtd",
            "execution",
            "ssl certificate",
            "communicating",
            "skynet",
            "malicious",
            "csc corporate",
            "domains",
            "code",
            "t services",
            "date",
            "saint louis",
            "server",
            "registrar abuse",
            "whois lookups",
            "tech email",
            "threat roundup",
            "july",
            "march",
            "june",
            "files",
            "august",
            "phishing",
            "service",
            "amadey",
            "blacknet rat",
            "roundup",
            "magecart",
            "powershell",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "gmt vary",
            "gmt connection",
            "link",
            "studio",
            "side",
            "studios",
            "downtown denver",
            "colorado",
            "studios og",
            "html info",
            "title denver",
            "studios meta",
            "tags og",
            "hallrender",
            "mark brian sabey",
            "tulach",
            "passive dns",
            "urls",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "domain",
            "files ip",
            "united",
            "as36646 oath",
            "unknown",
            "body doctype",
            "yahoo title",
            "x ua",
            "ieedge chrome1",
            "possible",
            "as19137 epsilon",
            "ipv4",
            "pulse pulses",
            "body",
            "headers nel",
            "contentencoding",
            "connection",
            "access control",
            "search",
            "address",
            "domain robot",
            "record value",
            "next",
            "parking crew",
            "tracking",
            "tsara brashears",
            "targeting",
            "as20940",
            "aaaa",
            "as714 apple",
            "as16625 akamai",
            "win32mydoom feb",
            "name servers",
            "as6185 apple",
            "creation date",
            "trojan",
            "virtool",
            "worm",
            "servers",
            "expiration date",
            "moved",
            "certificate",
            "showing",
            "entries"
          ],
          "references": [
            "adsl-074-168-130-217.sip.pns.bellsouth.net",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://www.cibc.ca/en/personal-banking/bank-accounts/savings-accounts/bonus-savings.htm",
            "http://iv-u15.com/category/uncensored-leaked [ BitDefender: Porn \u2022 Xcitium: Verdict Cloud illegal software \u2022 Forcepoint: ThreatSeeker adult content]",
            "Found in: https://side3.com/ \u2022 https://side3.com/wp-json/ \u2022 https://side3.com/wp-json/wp/v2/pages/9 \u2022 https://side3.com/xmlrpc.php \u2022 side3.com \u2022 https://side3.com/wp-content/uploads/2015/07/favicon.ico.gif \u2022 https://www.facebook.com/side3studios",
            "CnC IP's: 20.103.85.33 \u2022 213.91.128.13 \u2022 74.6.143.25 \u2022 74.6.143.26 \u2022 74.6.231.20 \u2022 74.6.231.21",
            "https://otx.alienvault.com/indicator/ip/74.6.231.21",
            "nr-data.net [Apple Private Data Collection]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Tracking. Transactional agreement]",
            "mail.secure2.store.apple.com [vprsecure.com \u2022 Worm:Win32/Mydoom]"
          ],
          "public": 1,
          "adversary": "NSO GROUP",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3263,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 2596,
            "domain": 1168,
            "hostname": 1877,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 9170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
        "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
        "https://www.cibc.ca/en/personal-banking/bank-accounts/savings-accounts/bonus-savings.htm",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Tracking. Transactional agreement]",
        "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
        "mail.secure2.store.apple.com [vprsecure.com \u2022 Worm:Win32/Mydoom]",
        "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
        "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
        "Found in: https://side3.com/ \u2022 https://side3.com/wp-json/ \u2022 https://side3.com/wp-json/wp/v2/pages/9 \u2022 https://side3.com/xmlrpc.php \u2022 side3.com \u2022 https://side3.com/wp-content/uploads/2015/07/favicon.ico.gif \u2022 https://www.facebook.com/side3studios",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
        "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
        "CnC IP's: 20.103.85.33 \u2022 213.91.128.13 \u2022 74.6.143.25 \u2022 74.6.143.26 \u2022 74.6.231.20 \u2022 74.6.231.21",
        "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com",
        "https://otx.alienvault.com/indicator/ip/74.6.231.21",
        "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
        "nr-data.net [Apple Private Data Collection]",
        "adsl-074-168-130-217.sip.pns.bellsouth.net",
        "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
        "www.gambinospizza.com",
        "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
        "http://iv-u15.com/category/uncensored-leaked [ BitDefender: Porn \u2022 Xcitium: Verdict Cloud illegal software \u2022 Forcepoint: ThreatSeeker adult content]",
        "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
        "http://porn.toplistcreator.eu/in.php",
        "CVE-2014-0160 \u2022 CVE-2017-11882",
        "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
        "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO GROUP"
          ],
          "malware_families": [
            "Pegasus",
            "Emotet",
            "Sabey",
            "Amadey",
            "Content reputation",
            "Skynet",
            "Zbot",
            "Trojan:win32/comspec",
            "Tulach",
            "Xls:nastya\\ [trj]",
            "Crypt4.ygm",
            "Heartbleed bug",
            "Blacknet rat",
            "Et",
            "Possible",
            "Hallrender"
          ],
          "industries": [],
          "unique_indicators": 72429
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/micr0soft.com",
    "whois": "http://whois.domaintools.com/micr0soft.com",
    "domain": "micr0soft.com",
    "hostname": "www.micr0soft.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "6824aa10fa32899c33abc3be",
      "name": "tp://adorno.pl and http://vgt.pl INVESTIGATION requstor user Axelo",
      "description": "https://t.co/zTZNBTe8GV",
      "modified": "2025-06-14T00:00:30.956000",
      "created": "2025-05-14T14:34:56.497000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 426,
        "FileHash-SHA1": 455,
        "FileHash-SHA256": 5596,
        "URL": 15206,
        "IPv4": 409,
        "domain": 2473,
        "hostname": 5059,
        "CVE": 3
      },
      "indicator_count": 29627,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "309 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cd05cd3c9d0cc0b9ed215f",
      "name": "Emotet - https://www.gambinospizza.com | Brian Sabey \u2022 HallRender",
      "description": "\u2022Emotet botnets were observed dropping Trickbot to deliver ransomware payloads against some victims and Qakbot Trojans to steal banking credentials and data from other targets.\n\n\u2022Scammer 'Attorney' Brian Sabey | HallRender associated ; utilizes every form of social engineering to gain full access to phone numbers, email, banking,  network, relatives, contacts, PHI, PII, modifies services.\n.",
      "modified": "2024-04-15T08:03:32.381000",
      "created": "2024-02-14T18:26:21.427000",
      "tags": [
        "united",
        "unknown",
        "status",
        "sec ch",
        "as44273 host",
        "search",
        "aaaa",
        "showing",
        "ch ua",
        "record value",
        "ssl certificate",
        "threat roundup",
        "contacted",
        "communicating",
        "historical ssl",
        "referrer",
        "resolutions",
        "http",
        "execution",
        "gopher",
        "pattern match",
        "breakpoint",
        "command decode",
        "desktop",
        "base",
        "gambino",
        "pizza",
        "suricata ipv4",
        "mitre att",
        "date",
        "meta",
        "footer",
        "february",
        "general",
        "model",
        "comspec",
        "click",
        "strings",
        "main",
        "brian sabey",
        "hallrender",
        "trojan",
        "worm",
        "frankfurt",
        "germany",
        "asn15169",
        "google",
        "asn16509",
        "amazon02",
        "asn396982",
        "kansas city",
        "franchise url",
        "gmbh version",
        "status page",
        "service privacy",
        "legal",
        "impressum",
        "reverse dns",
        "general full",
        "url https",
        "resource",
        "hash",
        "protocol h2",
        "asn13335",
        "cloudflarenet",
        "software",
        "domains",
        "hashes",
        "learn",
        "issues tab",
        "value",
        "variables",
        "typeof function",
        "topropertykey",
        "bricksintersect",
        "bricksfunction",
        "domainpath name",
        "request chain",
        "chain",
        "nl page",
        "url history",
        "javascript",
        "page url",
        "redirected",
        "poweshell",
        "bruschettab",
        "mobsterstageda",
        "calzonec",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "beefpizzac",
        "superitaliansub",
        "cname",
        "msie",
        "chrome",
        "asnone united",
        "as6336 turn",
        "nxdomain",
        "whitelisted",
        "creation date",
        "turn",
        "body",
        "algorithm",
        "v3 serial",
        "number",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "x509v3 extended",
        "info",
        "first",
        "server",
        "registrar abuse",
        "iana id",
        "registrar url",
        "registrar whois",
        "contact email",
        "registry domain",
        "contact phone",
        "dnssec",
        "code",
        "type name",
        "win32 exe",
        "recreation",
        "whois record",
        "infected",
        "page dow",
        "poser",
        "scammer",
        "security",
        "malvertizing",
        "betting",
        "illegal activity",
        "linux",
        "teen porn",
        "child exploitation",
        "script urls",
        "a domains",
        "as10796 charter",
        "find your",
        "next franchise",
        "x content",
        "backend",
        "as13768 aptum",
        "moved",
        "passive dns",
        "urls",
        "as2635",
        "as14061",
        "scan endpoints",
        "all octoseek",
        "url http",
        "pulse pulses",
        "ip address",
        "related nids",
        "files location",
        "date hash",
        "avast avg",
        "nastya",
        "entries",
        "emotet",
        "windows nt",
        "show",
        "etpro trojan",
        "channel",
        "artemis",
        "medium",
        "delete",
        "copy",
        "virustotal",
        "trojan",
        "write",
        "trojanproxy",
        "vipre",
        "panda",
        "malware",
        "malware infection",
        "dga",
        "algorithm generated domains",
        "command and control",
        "pe32 executable",
        "tag",
        "tagging",
        "porn tagging",
        "as3356 level",
        "tahoma arial",
        "servers",
        "as1136 kpn",
        "next",
        "et",
        "remote",
        "confirm http",
        "sectrack",
        "openssl",
        "fulldisc",
        "secunia",
        "confirm https",
        "openssl tls",
        "multiple",
        "remote",
        "misc https",
        "impact",
        "heartbleed",
        "external source",
        "name hyperlink",
        "hp hpsbmu02998",
        "hp hpsbmu03019",
        "hp hpsbmu03030",
        "hp hpsbmu03018",
        "title",
        "lowfi",
        "title error",
        "body doctype",
        "html public",
        "w3cdtd html",
        "html head",
        "mozilla",
        "720.282.2025",
        "masquerading",
        "ninite feb",
        "mtb feb",
        "telper",
        "trojandropper",
        "ninite",
        "create c",
        "read c",
        "default",
        "create",
        "unicode",
        "dock",
        "xport"
      ],
      "references": [
        "www.gambinospizza.com",
        "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
        "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
        "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
        "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
        "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
        "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
        "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
        "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
        "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
        "http://porn.toplistcreator.eu/in.php",
        "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
        "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10",
        "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
        "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
        "CVE-2014-0160 \u2022 CVE-2017-11882",
        "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
        "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Comspec",
          "display_name": "Trojan:Win32/Comspec",
          "target": "/malware/Trojan:Win32/Comspec"
        },
        {
          "id": "XLS:Nastya\\ [Trj]",
          "display_name": "XLS:Nastya\\ [Trj]",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Crypt4.YGM",
          "display_name": "Crypt4.YGM",
          "target": null
        },
        {
          "id": "ZBot",
          "display_name": "ZBot",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Heartbleed Bug",
          "display_name": "Heartbleed Bug",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 59,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 118,
        "FileHash-SHA1": 106,
        "domain": 3271,
        "hostname": 2451,
        "URL": 8652,
        "email": 8,
        "FileHash-SHA256": 3153,
        "CVE": 4
      },
      "indicator_count": 17763,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "734 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c5e50dda752af9eab50933",
      "name": "Side 3 Studios Pegasus Attack Denver, Co \u2022 SkyNet BotNetwork",
      "description": "Pegasus abuse by an alleged legal team with the malware hosting DGA domain https://hallrender.com. Related to an ongoing attack by a M.Brian Sabey who has fixated on a non criminal target. It's frightening to see the carelessness of the Cellebrite tool at work. \nAccording to all written accounts Side 3 provides services to Grammy award winning, nominated and aspiring artists. If you're heard of them , they've recorded there. There is evidence of music file transfers possibly, illegally sold to well known artist. This may have been done without knowledge of studio representatives. More likely by a hacker who boldly informed.",
      "modified": "2024-03-10T08:03:07.690000",
      "created": "2024-02-09T08:40:45.976000",
      "tags": [
        "malware",
        "pegasus",
        "cellbrite",
        "targets sa",
        "survivor",
        "referrer",
        "contacted urls",
        "contacted",
        "whois record",
        "hr rtd",
        "execution",
        "ssl certificate",
        "communicating",
        "skynet",
        "malicious",
        "csc corporate",
        "domains",
        "code",
        "t services",
        "date",
        "saint louis",
        "server",
        "registrar abuse",
        "whois lookups",
        "tech email",
        "threat roundup",
        "july",
        "march",
        "june",
        "files",
        "august",
        "phishing",
        "service",
        "amadey",
        "blacknet rat",
        "roundup",
        "magecart",
        "powershell",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "gmt vary",
        "gmt connection",
        "link",
        "studio",
        "side",
        "studios",
        "downtown denver",
        "colorado",
        "studios og",
        "html info",
        "title denver",
        "studios meta",
        "tags og",
        "hallrender",
        "mark brian sabey",
        "tulach",
        "passive dns",
        "urls",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "domain",
        "files ip",
        "united",
        "as36646 oath",
        "unknown",
        "body doctype",
        "yahoo title",
        "x ua",
        "ieedge chrome1",
        "possible",
        "as19137 epsilon",
        "ipv4",
        "pulse pulses",
        "body",
        "headers nel",
        "contentencoding",
        "connection",
        "access control",
        "search",
        "address",
        "domain robot",
        "record value",
        "next",
        "parking crew",
        "tracking",
        "tsara brashears",
        "targeting",
        "as20940",
        "aaaa",
        "as714 apple",
        "as16625 akamai",
        "win32mydoom feb",
        "name servers",
        "as6185 apple",
        "creation date",
        "trojan",
        "virtool",
        "worm",
        "servers",
        "expiration date",
        "moved",
        "certificate",
        "showing",
        "entries"
      ],
      "references": [
        "adsl-074-168-130-217.sip.pns.bellsouth.net",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://www.cibc.ca/en/personal-banking/bank-accounts/savings-accounts/bonus-savings.htm",
        "http://iv-u15.com/category/uncensored-leaked [ BitDefender: Porn \u2022 Xcitium: Verdict Cloud illegal software \u2022 Forcepoint: ThreatSeeker adult content]",
        "Found in: https://side3.com/ \u2022 https://side3.com/wp-json/ \u2022 https://side3.com/wp-json/wp/v2/pages/9 \u2022 https://side3.com/xmlrpc.php \u2022 side3.com \u2022 https://side3.com/wp-content/uploads/2015/07/favicon.ico.gif \u2022 https://www.facebook.com/side3studios",
        "CnC IP's: 20.103.85.33 \u2022 213.91.128.13 \u2022 74.6.143.25 \u2022 74.6.143.26 \u2022 74.6.231.20 \u2022 74.6.231.21",
        "https://otx.alienvault.com/indicator/ip/74.6.231.21",
        "nr-data.net [Apple Private Data Collection]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Tracking. Transactional agreement]",
        "mail.secure2.store.apple.com [vprsecure.com \u2022 Worm:Win32/Mydoom]"
      ],
      "public": 1,
      "adversary": "NSO GROUP",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3263,
        "FileHash-MD5": 133,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 2596,
        "domain": 1168,
        "hostname": 1877,
        "CVE": 2,
        "email": 6
      },
      "indicator_count": 9170,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597f9c7542ffc6fffaecb30",
      "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
      "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:44:55.030000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4d4b5e060fb8a606a8",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.403000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4da16bd99cc5c02528",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.406000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.micr0soft.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.micr0soft.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642085.0396626
}