{
  "type": "URL",
  "indicator": "https://www.threads.com/@luceritaxoxo",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.threads.com/@luceritaxoxo",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4167065291,
      "indicator": "https://www.threads.com/@luceritaxoxo",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "69ca31b28c2fa3e734bf5000",
          "name": "instagram staged credit clone a vashti :(",
          "description": "",
          "modified": "2026-03-31T12:16:21.521000",
          "created": "2026-03-30T08:17:54.205000",
          "tags": [
            "dynamicloader",
            "port",
            "destination",
            "yara rule",
            "high",
            "tofsee",
            "rndhex",
            "rndchar",
            "loaderid",
            "write",
            "stream",
            "malware",
            "systemroot",
            "write c",
            "displayname",
            "windows",
            "trojan",
            "defender",
            "unknown",
            "less see",
            "all ip",
            "contacted",
            "less related",
            "meta",
            "emotet",
            "backdoor",
            "packer",
            "many",
            "hall render",
            "brian sabey",
            "christopher p. ahmann",
            "state of colorado",
            "google",
            "yahoo",
            "microsoft",
            "stealth window",
            "reads_self",
            "injection write process",
            "remote",
            "remote process",
            "dynamic function loading",
            "compromises device",
            "dead connect",
            "dynamic loader",
            "command",
            "cnc",
            "sleep sandbox",
            "iocontrol",
            "behavior tofsee",
            "suspicious code",
            "injection",
            "persistence",
            "rootkit",
            "social media",
            "belgium belgium",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "network traffic",
            "t1071",
            "spawns",
            "html content",
            "href",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "defense evasion",
            "development att",
            "tracking"
          ],
          "references": [
            "Instagram.com",
            "IDS Detections: tofsee",
            "Alerts antivm_generic_services persistence_ads anomalous_deletefile Idead_connect",
            "Alerts: suspicious_tld queries_computer_name dynamic_function_loading",
            "Alerts: antidebug_setunhandledexceptionfilter antivm_network_adapters",
            "IP\u2019s Contacted: 94.100.180.31  142.251.9.27  98.136.96.91  43.231.4.7  52.101.8.42",
            "Domains Contacted microsoft.com microsoft-com.mail.protection.outlook.com yahoo.com mta7.am0.yahoodns.net google.com",
            "Brian Sabey , Christopher P. Ahmann , State of Colorado who",
            "http://tracking-sa3.account.riyadhair.com/tracking/1/open/UGnB4w8RQiQ_9PYty4S-rwBmOetPQw3ubFHSNKg_IdhZfkaCbjqN3pnR4Xwk6pQcRBqF2aoq0uEaKMM4CX1kTpZsAD10-fxAPEgqGzJ2o7BJmsh_G2B6P-m_Xqc_LOycbcGBss0kXIEJvMGRw2SMITzqmVnh1yI_FuZV37qgGHZG3lP1V-WMaNTc8FYNIcgSRyTFamC5k3I1LkpsmTgX5Dd20Ko3IxUqFRC74clpVo-uFwRAb1Q1gSfKrDBX6_LaXkgv9gfyPy7L2BKxAmFBe-Ump3D_wGRDTXekPO5VZJ46hn0pUrOy2g8606kgb703eJVnmrz0cgCd-8P1dOdfoOFrSqOuXzfDNCaUU-2xl1aHVjGCZGIWX6B4bYqznMqsvI8UxoitF5tZTZ3opRhymDkrsItHdJPUnzkc6N_Z370RVT54BihKCohH14lIRQVQN9v74E",
            "Looks like a Pegasus tracking sphere. All contacts and contacts, contacts tracked."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Emotet.YL",
              "display_name": "Trojan:Win32/Emotet.YL",
              "target": "/malware/Trojan:Win32/Emotet.YL"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6949b6d8180bca3df9783578",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 911,
            "domain": 178,
            "hostname": 206,
            "FileHash-SHA256": 647,
            "FileHash-MD5": 38,
            "FileHash-SHA1": 28
          },
          "indicator_count": 2008,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "20 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6949b6d8180bca3df9783578",
          "name": "Instagram (staged) Emotet & Tofsee Backdoor",
          "description": "If you choose to read this, I apologize for the riddle.Pegasus like tracking operation.\nAdversarial attack on a private citizens or (possibly staged instagram account). The citizen is not a known target. Attacks appear to arise from same internet criminals, allegedly State of Colorado employees engaged in permissible criminal behavior. Account does belongs to a person in sphere of a known monitored target. Target naturally has no communication with account holder. Known target had been invited to be Facebook friends of infected account holder multiple times, both target and associate declined and blocked this infected account holder. |\n\n* Infected Instagram account holders husband referred target to a Colorado Law Firm. The Law firm was attacked some time ago. | \n***Infected instagram account holder name is  redacted. Is being tracked :(",
          "modified": "2026-01-21T20:01:56.174000",
          "created": "2025-12-22T21:23:36.083000",
          "tags": [
            "dynamicloader",
            "port",
            "destination",
            "yara rule",
            "high",
            "tofsee",
            "rndhex",
            "rndchar",
            "loaderid",
            "write",
            "stream",
            "malware",
            "systemroot",
            "write c",
            "displayname",
            "windows",
            "trojan",
            "defender",
            "unknown",
            "less see",
            "all ip",
            "contacted",
            "less related",
            "meta",
            "emotet",
            "backdoor",
            "packer",
            "many",
            "hall render",
            "brian sabey",
            "christopher p. ahmann",
            "state of colorado",
            "google",
            "yahoo",
            "microsoft",
            "stealth window",
            "reads_self",
            "injection write process",
            "remote",
            "remote process",
            "dynamic function loading",
            "compromises device",
            "dead connect",
            "dynamic loader",
            "command",
            "cnc",
            "sleep sandbox",
            "iocontrol",
            "behavior tofsee",
            "suspicious code",
            "injection",
            "persistence",
            "rootkit",
            "social media",
            "belgium belgium",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "network traffic",
            "t1071",
            "spawns",
            "html content",
            "href",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "defense evasion",
            "development att",
            "tracking"
          ],
          "references": [
            "Instagram.com",
            "IDS Detections: tofsee",
            "Alerts antivm_generic_services persistence_ads anomalous_deletefile Idead_connect",
            "Alerts: suspicious_tld queries_computer_name dynamic_function_loading",
            "Alerts: antidebug_setunhandledexceptionfilter antivm_network_adapters",
            "IP\u2019s Contacted: 94.100.180.31  142.251.9.27  98.136.96.91  43.231.4.7  52.101.8.42",
            "Domains Contacted microsoft.com microsoft-com.mail.protection.outlook.com yahoo.com mta7.am0.yahoodns.net google.com",
            "Brian Sabey , Christopher P. Ahmann , State of Colorado who",
            "http://tracking-sa3.account.riyadhair.com/tracking/1/open/UGnB4w8RQiQ_9PYty4S-rwBmOetPQw3ubFHSNKg_IdhZfkaCbjqN3pnR4Xwk6pQcRBqF2aoq0uEaKMM4CX1kTpZsAD10-fxAPEgqGzJ2o7BJmsh_G2B6P-m_Xqc_LOycbcGBss0kXIEJvMGRw2SMITzqmVnh1yI_FuZV37qgGHZG3lP1V-WMaNTc8FYNIcgSRyTFamC5k3I1LkpsmTgX5Dd20Ko3IxUqFRC74clpVo-uFwRAb1Q1gSfKrDBX6_LaXkgv9gfyPy7L2BKxAmFBe-Ump3D_wGRDTXekPO5VZJ46hn0pUrOy2g8606kgb703eJVnmrz0cgCd-8P1dOdfoOFrSqOuXzfDNCaUU-2xl1aHVjGCZGIWX6B4bYqznMqsvI8UxoitF5tZTZ3opRhymDkrsItHdJPUnzkc6N_Z370RVT54BihKCohH14lIRQVQN9v74E",
            "Looks like a Pegasus tracking sphere. All contacts and contacts, contacts tracked."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Emotet.YL",
              "display_name": "Trojan:Win32/Emotet.YL",
              "target": "/malware/Trojan:Win32/Emotet.YL"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 910,
            "domain": 177,
            "hostname": 206,
            "FileHash-SHA256": 647,
            "FileHash-MD5": 38,
            "FileHash-SHA1": 28
          },
          "indicator_count": 2006,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "89 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts antivm_generic_services persistence_ads anomalous_deletefile Idead_connect",
        "IP\u2019s Contacted: 94.100.180.31  142.251.9.27  98.136.96.91  43.231.4.7  52.101.8.42",
        "Alerts: suspicious_tld queries_computer_name dynamic_function_loading",
        "http://tracking-sa3.account.riyadhair.com/tracking/1/open/UGnB4w8RQiQ_9PYty4S-rwBmOetPQw3ubFHSNKg_IdhZfkaCbjqN3pnR4Xwk6pQcRBqF2aoq0uEaKMM4CX1kTpZsAD10-fxAPEgqGzJ2o7BJmsh_G2B6P-m_Xqc_LOycbcGBss0kXIEJvMGRw2SMITzqmVnh1yI_FuZV37qgGHZG3lP1V-WMaNTc8FYNIcgSRyTFamC5k3I1LkpsmTgX5Dd20Ko3IxUqFRC74clpVo-uFwRAb1Q1gSfKrDBX6_LaXkgv9gfyPy7L2BKxAmFBe-Ump3D_wGRDTXekPO5VZJ46hn0pUrOy2g8606kgb703eJVnmrz0cgCd-8P1dOdfoOFrSqOuXzfDNCaUU-2xl1aHVjGCZGIWX6B4bYqznMqsvI8UxoitF5tZTZ3opRhymDkrsItHdJPUnzkc6N_Z370RVT54BihKCohH14lIRQVQN9v74E",
        "Brian Sabey , Christopher P. Ahmann , State of Colorado who",
        "Instagram.com",
        "Domains Contacted microsoft.com microsoft-com.mail.protection.outlook.com yahoo.com mta7.am0.yahoodns.net google.com",
        "IDS Detections: tofsee",
        "Alerts: antidebug_setunhandledexceptionfilter antivm_network_adapters",
        "Looks like a Pegasus tracking sphere. All contacts and contacts, contacts tracked."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.packer.pkr_ce1a-9980177-0",
            "Trojan:win32/emotet.yl",
            "Backdoor:win32/tofsee.t"
          ],
          "industries": [],
          "unique_indicators": 2053
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/threads.com",
    "whois": "http://whois.domaintools.com/threads.com",
    "domain": "threads.com",
    "hostname": "www.threads.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "69ca31b28c2fa3e734bf5000",
      "name": "instagram staged credit clone a vashti :(",
      "description": "",
      "modified": "2026-03-31T12:16:21.521000",
      "created": "2026-03-30T08:17:54.205000",
      "tags": [
        "dynamicloader",
        "port",
        "destination",
        "yara rule",
        "high",
        "tofsee",
        "rndhex",
        "rndchar",
        "loaderid",
        "write",
        "stream",
        "malware",
        "systemroot",
        "write c",
        "displayname",
        "windows",
        "trojan",
        "defender",
        "unknown",
        "less see",
        "all ip",
        "contacted",
        "less related",
        "meta",
        "emotet",
        "backdoor",
        "packer",
        "many",
        "hall render",
        "brian sabey",
        "christopher p. ahmann",
        "state of colorado",
        "google",
        "yahoo",
        "microsoft",
        "stealth window",
        "reads_self",
        "injection write process",
        "remote",
        "remote process",
        "dynamic function loading",
        "compromises device",
        "dead connect",
        "dynamic loader",
        "command",
        "cnc",
        "sleep sandbox",
        "iocontrol",
        "behavior tofsee",
        "suspicious code",
        "injection",
        "persistence",
        "rootkit",
        "social media",
        "belgium belgium",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "network traffic",
        "t1071",
        "spawns",
        "html content",
        "href",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "defense evasion",
        "development att",
        "tracking"
      ],
      "references": [
        "Instagram.com",
        "IDS Detections: tofsee",
        "Alerts antivm_generic_services persistence_ads anomalous_deletefile Idead_connect",
        "Alerts: suspicious_tld queries_computer_name dynamic_function_loading",
        "Alerts: antidebug_setunhandledexceptionfilter antivm_network_adapters",
        "IP\u2019s Contacted: 94.100.180.31  142.251.9.27  98.136.96.91  43.231.4.7  52.101.8.42",
        "Domains Contacted microsoft.com microsoft-com.mail.protection.outlook.com yahoo.com mta7.am0.yahoodns.net google.com",
        "Brian Sabey , Christopher P. Ahmann , State of Colorado who",
        "http://tracking-sa3.account.riyadhair.com/tracking/1/open/UGnB4w8RQiQ_9PYty4S-rwBmOetPQw3ubFHSNKg_IdhZfkaCbjqN3pnR4Xwk6pQcRBqF2aoq0uEaKMM4CX1kTpZsAD10-fxAPEgqGzJ2o7BJmsh_G2B6P-m_Xqc_LOycbcGBss0kXIEJvMGRw2SMITzqmVnh1yI_FuZV37qgGHZG3lP1V-WMaNTc8FYNIcgSRyTFamC5k3I1LkpsmTgX5Dd20Ko3IxUqFRC74clpVo-uFwRAb1Q1gSfKrDBX6_LaXkgv9gfyPy7L2BKxAmFBe-Ump3D_wGRDTXekPO5VZJ46hn0pUrOy2g8606kgb703eJVnmrz0cgCd-8P1dOdfoOFrSqOuXzfDNCaUU-2xl1aHVjGCZGIWX6B4bYqznMqsvI8UxoitF5tZTZ3opRhymDkrsItHdJPUnzkc6N_Z370RVT54BihKCohH14lIRQVQN9v74E",
        "Looks like a Pegasus tracking sphere. All contacts and contacts, contacts tracked."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Emotet.YL",
          "display_name": "Trojan:Win32/Emotet.YL",
          "target": "/malware/Trojan:Win32/Emotet.YL"
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1051",
          "name": "Shared Webroot",
          "display_name": "T1051 - Shared Webroot"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6949b6d8180bca3df9783578",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 911,
        "domain": 178,
        "hostname": 206,
        "FileHash-SHA256": 647,
        "FileHash-MD5": 38,
        "FileHash-SHA1": 28
      },
      "indicator_count": 2008,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "20 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6949b6d8180bca3df9783578",
      "name": "Instagram (staged) Emotet & Tofsee Backdoor",
      "description": "If you choose to read this, I apologize for the riddle.Pegasus like tracking operation.\nAdversarial attack on a private citizens or (possibly staged instagram account). The citizen is not a known target. Attacks appear to arise from same internet criminals, allegedly State of Colorado employees engaged in permissible criminal behavior. Account does belongs to a person in sphere of a known monitored target. Target naturally has no communication with account holder. Known target had been invited to be Facebook friends of infected account holder multiple times, both target and associate declined and blocked this infected account holder. |\n\n* Infected Instagram account holders husband referred target to a Colorado Law Firm. The Law firm was attacked some time ago. | \n***Infected instagram account holder name is  redacted. Is being tracked :(",
      "modified": "2026-01-21T20:01:56.174000",
      "created": "2025-12-22T21:23:36.083000",
      "tags": [
        "dynamicloader",
        "port",
        "destination",
        "yara rule",
        "high",
        "tofsee",
        "rndhex",
        "rndchar",
        "loaderid",
        "write",
        "stream",
        "malware",
        "systemroot",
        "write c",
        "displayname",
        "windows",
        "trojan",
        "defender",
        "unknown",
        "less see",
        "all ip",
        "contacted",
        "less related",
        "meta",
        "emotet",
        "backdoor",
        "packer",
        "many",
        "hall render",
        "brian sabey",
        "christopher p. ahmann",
        "state of colorado",
        "google",
        "yahoo",
        "microsoft",
        "stealth window",
        "reads_self",
        "injection write process",
        "remote",
        "remote process",
        "dynamic function loading",
        "compromises device",
        "dead connect",
        "dynamic loader",
        "command",
        "cnc",
        "sleep sandbox",
        "iocontrol",
        "behavior tofsee",
        "suspicious code",
        "injection",
        "persistence",
        "rootkit",
        "social media",
        "belgium belgium",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "network traffic",
        "t1071",
        "spawns",
        "html content",
        "href",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "defense evasion",
        "development att",
        "tracking"
      ],
      "references": [
        "Instagram.com",
        "IDS Detections: tofsee",
        "Alerts antivm_generic_services persistence_ads anomalous_deletefile Idead_connect",
        "Alerts: suspicious_tld queries_computer_name dynamic_function_loading",
        "Alerts: antidebug_setunhandledexceptionfilter antivm_network_adapters",
        "IP\u2019s Contacted: 94.100.180.31  142.251.9.27  98.136.96.91  43.231.4.7  52.101.8.42",
        "Domains Contacted microsoft.com microsoft-com.mail.protection.outlook.com yahoo.com mta7.am0.yahoodns.net google.com",
        "Brian Sabey , Christopher P. Ahmann , State of Colorado who",
        "http://tracking-sa3.account.riyadhair.com/tracking/1/open/UGnB4w8RQiQ_9PYty4S-rwBmOetPQw3ubFHSNKg_IdhZfkaCbjqN3pnR4Xwk6pQcRBqF2aoq0uEaKMM4CX1kTpZsAD10-fxAPEgqGzJ2o7BJmsh_G2B6P-m_Xqc_LOycbcGBss0kXIEJvMGRw2SMITzqmVnh1yI_FuZV37qgGHZG3lP1V-WMaNTc8FYNIcgSRyTFamC5k3I1LkpsmTgX5Dd20Ko3IxUqFRC74clpVo-uFwRAb1Q1gSfKrDBX6_LaXkgv9gfyPy7L2BKxAmFBe-Ump3D_wGRDTXekPO5VZJ46hn0pUrOy2g8606kgb703eJVnmrz0cgCd-8P1dOdfoOFrSqOuXzfDNCaUU-2xl1aHVjGCZGIWX6B4bYqznMqsvI8UxoitF5tZTZ3opRhymDkrsItHdJPUnzkc6N_Z370RVT54BihKCohH14lIRQVQN9v74E",
        "Looks like a Pegasus tracking sphere. All contacts and contacts, contacts tracked."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Emotet.YL",
          "display_name": "Trojan:Win32/Emotet.YL",
          "target": "/malware/Trojan:Win32/Emotet.YL"
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1051",
          "name": "Shared Webroot",
          "display_name": "T1051 - Shared Webroot"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 910,
        "domain": 177,
        "hostname": 206,
        "FileHash-SHA256": 647,
        "FileHash-MD5": 38,
        "FileHash-SHA1": 28
      },
      "indicator_count": 2006,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "89 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.threads.com/@luceritaxoxo",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.threads.com/@luceritaxoxo",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776722653.7656114
}