{
  "type": "URL",
  "indicator": "https://www.xing101.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.xing101.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3659420344,
      "indicator": "https://www.xing101.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 9,
      "pulses": [
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656457d8dfbb95a0be58b263",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-11-27T08:48:22.997000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 76,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9a1c71847ed3f62bca19",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T02:44:44.329000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa406d0b8009df583c87c",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T03:27:02.624000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655e5c72277117d3b0e00fbd",
          "name": "Command and Scripting Interpreter",
          "description": "https:/www.usaopps.com/government_contractors/contractor-5388777-SIERRA-PIPELINE-INC-.htm",
          "modified": "2023-12-22T19:00:52.050000",
          "created": "2023-11-22T19:54:26.925000",
          "tags": [
            "whois record",
            "contacted",
            "execution",
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "problems",
            "red team",
            "whois whois",
            "referrer",
            "startpage",
            "generic malware",
            "cobaltstrike",
            "malware generic",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist https",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malware",
            "malicious site",
            "malware site",
            "malicious url",
            "phishing site",
            "alexa",
            "phishing",
            "redline stealer",
            "bank",
            "team",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "live",
            "zbot",
            "united",
            "cyber threat",
            "covid19",
            "mail spammer",
            "malicious host",
            "anonymizer",
            "engineering",
            "purplewave",
            "malicious",
            "keybase",
            "union",
            "asyncrat",
            "cobalt strike",
            "dnspionage",
            "ransomware",
            "maltiverse",
            "malicious link",
            "detection list",
            "blacklist",
            "pattern match",
            "file",
            "ascii text",
            "windows nt",
            "appdata",
            "mitre att",
            "null",
            "date",
            "ck id",
            "show technique",
            "unknown",
            "accept",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "fast",
            "blacklist http",
            "heur",
            "adware",
            "unsafe",
            "riskware",
            "agent",
            "swrort",
            "exploit",
            "crack",
            "opencandy",
            "tiggre",
            "cleaner",
            "conduit",
            "wacatac",
            "nircmd",
            "filetour",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "acint",
            "systweak",
            "behav",
            "genkryptik",
            "xtrat",
            "softcnapp",
            "fusioncore",
            "installpack",
            "xrat",
            "jquery",
            "content scraper",
            "malware hosting",
            "bid site",
            "https:/www.usaopps.com/government_contractors/contractor-5388777",
            "CVE-2017-11882",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-3153",
            "CVE-2014-6332",
            "CVE-2016-0189",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "CVE-2021-27065",
            "CVE-2021-40444"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/bc437a855075805df699bd915cd27814a799969bb38db45f09f5f16a54ccc5b6/655e548bc2555fc8280ba976",
            "https:/www.usaopps.com/government_contractors/contractor-5388777-SIERRA-PIPELINE-INC-.htm"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Business",
            "Economy",
            "Government",
            "Legal"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 608,
            "FileHash-SHA1": 312,
            "FileHash-SHA256": 1086,
            "URL": 2843,
            "domain": 341,
            "hostname": 1091,
            "CVE": 16
          },
          "indicator_count": 6297,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709943cc506763d721edec",
          "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
          "description": "",
          "modified": "2023-12-06T15:54:43.175000",
          "created": "2023-12-06T15:54:43.175000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 781,
            "domain": 712,
            "URL": 4962,
            "hostname": 1795,
            "email": 4,
            "FileHash-MD5": 164,
            "FileHash-SHA1": 159
          },
          "indicator_count": 8577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6430dfed2b3b3f93d5a7cc19",
          "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
          "description": "",
          "modified": "2023-05-08T02:00:47.680000",
          "created": "2023-04-08T03:30:53.195000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "optout",
            "runtime data",
            "ansi",
            "pcap processing",
            "drmedgeua",
            "pcap",
            "pcap frame",
            "optin",
            "edgeua",
            "date",
            "suspicious",
            "hybrid",
            "close",
            "click",
            "hosts",
            "april",
            "general",
            "strings",
            "qakbot",
            "united",
            "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9a478e33d2a8fa58780b09519e3f9bbbc9a32595e67b7fead10a9ad4ec17a614/6430cb9896a0a8d5f1092b9d",
            "https://hybrid-analysis.com/sample/e7d74be84c0b7bd09a96d5932c79d9579a9b2426f8ab43896a77a4b8b11d289a/6430d038f2ba281e660c5ef6",
            "http://cdn.lineate-33x.net/static/vpaid/vpaid.98dc0711.js?viewable_impression_url=https://lbs-event.gcp.lineate-33x.net/view?event=AAAAAB7wpEhwdgACAq1WS2xcVxmee8cej0dJIVkgVmjkBWrRnPF5P9pFcCPURiZpEocGsbHO0771vLgzdppUlSpL3VggFbOBLFAViU1WyCuwWHkFkUAoy7AiG5C7qbxC3oT_zkxQG7Hkyrpzzq_v_o_v_85_3Prt5dajy60bRDIplMAacyUNI0KoTSq55jKZEFnaZEQKxjVBIeGAeMQOmYAVwoxEil1yIsZNxqwvh-Px5dtFf7T5__X57X_99Xc_a7T__Y9__v1vq9-7UAXYK-I963rx9kUiTJdS0mW0S_BPyuvDB0WvZ1dFF7dfv1sMwvDeuH3jTpvgLn6rDQbJ32p_KPkb7bXRqBfvRrdeTFYFU10m26-vv3vn-g877",
            "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-%D7%91%D7%A7%D7%A2%D7%AA-%D7%91%D7%99%D7%AA-%D7%A6%D7%99%D7%93%D7%94"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4962,
            "hostname": 1795,
            "FileHash-SHA256": 781,
            "domain": 712,
            "email": 4,
            "FileHash-MD5": 164,
            "FileHash-SHA1": 159
          },
          "indicator_count": 8577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1077 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "nr-data.net   (Apple Private Data Collection)",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://michaela.young@uchealth.com/",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "https://hybrid-analysis.com/sample/9a478e33d2a8fa58780b09519e3f9bbbc9a32595e67b7fead10a9ad4ec17a614/6430cb9896a0a8d5f1092b9d",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://www.hybrid-analysis.com/sample/bc437a855075805df699bd915cd27814a799969bb38db45f09f5f16a54ccc5b6/655e548bc2555fc8280ba976",
        "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-%D7%91%D7%A7%D7%A2%D7%AA-%D7%91%D7%99%D7%AA-%D7%A6%D7%99%D7%93%D7%94",
        "https:/www.usaopps.com/government_contractors/contractor-5388777-SIERRA-PIPELINE-INC-.htm",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://hybrid-analysis.com/sample/e7d74be84c0b7bd09a96d5932c79d9579a9b2426f8ab43896a77a4b8b11d289a/6430d038f2ba281e660c5ef6",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com",
        "http://cdn.lineate-33x.net/static/vpaid/vpaid.98dc0711.js?viewable_impression_url=https://lbs-event.gcp.lineate-33x.net/view?event=AAAAAB7wpEhwdgACAq1WS2xcVxmee8cej0dJIVkgVmjkBWrRnPF5P9pFcCPURiZpEocGsbHO0771vLgzdppUlSpL3VggFbOBLFAViU1WyCuwWHkFkUAoy7AiG5C7qbxC3oT_zkxQG7Hkyrpzzq_v_o_v_85_3Prt5dajy60bRDIplMAacyUNI0KoTSq55jKZEFnaZEQKxjVBIeGAeMQOmYAVwoxEil1yIsZNxqwvh-Px5dtFf7T5__X57X_99Xc_a7T__Y9__v1vq9-7UAXYK-I963rx9kUiTJdS0mW0S_BPyuvDB0WvZ1dFF7dfv1sMwvDeuH3jTpvgLn6rDQbJ32p_KPkb7bXRqBfvRrdeTFYFU10m26-vv3vn-g877",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "http://fireeyei.iowa.gov/",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "T",
            "Keylogger",
            "Driverreviver",
            "Quasar",
            "Qakbot - s0650",
            "Generic",
            "O.gen",
            "Content reputation",
            "Et",
            "Trojanspy",
            "Xrat",
            "Maltiverse",
            "Redline"
          ],
          "industries": [
            "Business",
            "Government",
            "Economy",
            "Legal"
          ],
          "unique_indicators": 45432
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/xing101.com",
    "whois": "http://whois.domaintools.com/xing101.com",
    "domain": "xing101.com",
    "hostname": "www.xing101.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 9,
  "pulses": [
    {
      "id": "6597f9c7542ffc6fffaecb30",
      "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
      "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:44:55.030000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4d4b5e060fb8a606a8",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.403000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4da16bd99cc5c02528",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.406000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656457d8dfbb95a0be58b263",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-11-27T08:48:22.997000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 76,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9a1c71847ed3f62bca19",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T02:44:44.329000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 58,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aa406d0b8009df583c87c",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T03:27:02.624000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 60,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655e5c72277117d3b0e00fbd",
      "name": "Command and Scripting Interpreter",
      "description": "https:/www.usaopps.com/government_contractors/contractor-5388777-SIERRA-PIPELINE-INC-.htm",
      "modified": "2023-12-22T19:00:52.050000",
      "created": "2023-11-22T19:54:26.925000",
      "tags": [
        "whois record",
        "contacted",
        "execution",
        "ssl certificate",
        "historical ssl",
        "resolutions",
        "problems",
        "red team",
        "whois whois",
        "referrer",
        "startpage",
        "generic malware",
        "cobaltstrike",
        "malware generic",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "blacklist https",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "malware",
        "malicious site",
        "malware site",
        "malicious url",
        "phishing site",
        "alexa",
        "phishing",
        "redline stealer",
        "bank",
        "team",
        "iframe",
        "downldr",
        "presenoker",
        "artemis",
        "live",
        "zbot",
        "united",
        "cyber threat",
        "covid19",
        "mail spammer",
        "malicious host",
        "anonymizer",
        "engineering",
        "purplewave",
        "malicious",
        "keybase",
        "union",
        "asyncrat",
        "cobalt strike",
        "dnspionage",
        "ransomware",
        "maltiverse",
        "malicious link",
        "detection list",
        "blacklist",
        "pattern match",
        "file",
        "ascii text",
        "windows nt",
        "appdata",
        "mitre att",
        "null",
        "date",
        "ck id",
        "show technique",
        "unknown",
        "accept",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "fast",
        "blacklist http",
        "heur",
        "adware",
        "unsafe",
        "riskware",
        "agent",
        "swrort",
        "exploit",
        "crack",
        "opencandy",
        "tiggre",
        "cleaner",
        "conduit",
        "wacatac",
        "nircmd",
        "filetour",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "acint",
        "systweak",
        "behav",
        "genkryptik",
        "xtrat",
        "softcnapp",
        "fusioncore",
        "installpack",
        "xrat",
        "jquery",
        "content scraper",
        "malware hosting",
        "bid site",
        "https:/www.usaopps.com/government_contractors/contractor-5388777",
        "CVE-2017-11882",
        "CVE-2017-0147",
        "CVE-2017-8570",
        "CVE-2005-1790",
        "CVE-2009-3672",
        "CVE-2010-3962",
        "CVE-2012-3993",
        "CVE-2014-3153",
        "CVE-2014-6332",
        "CVE-2016-0189",
        "CVE-2017-0199",
        "CVE-2018-4893",
        "CVE-2020-0601",
        "CVE-2020-0674",
        "CVE-2021-27065",
        "CVE-2021-40444"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/bc437a855075805df699bd915cd27814a799969bb38db45f09f5f16a54ccc5b6/655e548bc2555fc8280ba976",
        "https:/www.usaopps.com/government_contractors/contractor-5388777-SIERRA-PIPELINE-INC-.htm"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Business",
        "Economy",
        "Government",
        "Legal"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 608,
        "FileHash-SHA1": 312,
        "FileHash-SHA256": 1086,
        "URL": 2843,
        "domain": 341,
        "hostname": 1091,
        "CVE": 16
      },
      "indicator_count": 6297,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "849 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709943cc506763d721edec",
      "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
      "description": "",
      "modified": "2023-12-06T15:54:43.175000",
      "created": "2023-12-06T15:54:43.175000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 781,
        "domain": 712,
        "URL": 4962,
        "hostname": 1795,
        "email": 4,
        "FileHash-MD5": 164,
        "FileHash-SHA1": 159
      },
      "indicator_count": 8577,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6430dfed2b3b3f93d5a7cc19",
      "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
      "description": "",
      "modified": "2023-05-08T02:00:47.680000",
      "created": "2023-04-08T03:30:53.195000",
      "tags": [
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "chromeua",
        "optout",
        "runtime data",
        "ansi",
        "pcap processing",
        "drmedgeua",
        "pcap",
        "pcap frame",
        "optin",
        "edgeua",
        "date",
        "suspicious",
        "hybrid",
        "close",
        "click",
        "hosts",
        "april",
        "general",
        "strings",
        "qakbot",
        "united",
        "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/9a478e33d2a8fa58780b09519e3f9bbbc9a32595e67b7fead10a9ad4ec17a614/6430cb9896a0a8d5f1092b9d",
        "https://hybrid-analysis.com/sample/e7d74be84c0b7bd09a96d5932c79d9579a9b2426f8ab43896a77a4b8b11d289a/6430d038f2ba281e660c5ef6",
        "http://cdn.lineate-33x.net/static/vpaid/vpaid.98dc0711.js?viewable_impression_url=https://lbs-event.gcp.lineate-33x.net/view?event=AAAAAB7wpEhwdgACAq1WS2xcVxmee8cej0dJIVkgVmjkBWrRnPF5P9pFcCPURiZpEocGsbHO0771vLgzdppUlSpL3VggFbOBLFAViU1WyCuwWHkFkUAoy7AiG5C7qbxC3oT_zkxQG7Hkyrpzzq_v_o_v_85_3Prt5dajy60bRDIplMAacyUNI0KoTSq55jKZEFnaZEQKxjVBIeGAeMQOmYAVwoxEil1yIsZNxqwvh-Px5dtFf7T5__X57X_99Xc_a7T__Y9__v1vq9-7UAXYK-I963rx9kUiTJdS0mW0S_BPyuvDB0WvZ1dFF7dfv1sMwvDeuH3jTpvgLn6rDQbJ32p_KPkb7bXRqBfvRrdeTFYFU10m26-vv3vn-g877",
        "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-%D7%91%D7%A7%D7%A2%D7%AA-%D7%91%D7%99%D7%AA-%D7%A6%D7%99%D7%93%D7%94"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4962,
        "hostname": 1795,
        "FileHash-SHA256": 781,
        "domain": 712,
        "email": 4,
        "FileHash-MD5": 164,
        "FileHash-SHA1": 159
      },
      "indicator_count": 8577,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 93,
      "modified_text": "1077 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.xing101.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.xing101.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642237.568817
}