{
  "type": "URL",
  "indicator": "https://y982.absolutdrinks.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://y982.absolutdrinks.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3814646765,
      "indicator": "https://y982.absolutdrinks.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "687b5499d48de6e54f3bff11",
          "name": "213.174.130.70 - Spyware Install  | Emotet via Malware sites",
          "description": "Malicious IP address for multiple malware domains. Very malicious spyware, will hijack network and devices. \n\u2022 Best Targeted sites \nSpyware Install\n\u2022 Garveep POST CnC\nBeacon\n\u2022 Worm.Mydoom\nCheckin\n\n#endgame #emotet #mydoom #malware_domains #install_spyware #monitered_targets",
          "modified": "2025-08-18T08:00:43.712000",
          "created": "2025-07-19T08:17:29.443000",
          "tags": [
            "handle",
            "ripe ncc",
            "ripe network",
            "address range",
            "cidr",
            "allocation type",
            "assigned pa",
            "status",
            "whois server",
            "entity ah36ripe",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "number",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "date",
            "abuse contact",
            "orgid",
            "orgtechhandle",
            "address",
            "orgabuseref",
            "postalcode",
            "ripe",
            "seen",
            "update date",
            "tech email",
            "admin country",
            "expiration date",
            "dnssec",
            "admin id",
            "mi11255597wp",
            "msie",
            "chrome",
            "passive dns",
            "united",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "hosting",
            "open",
            "body",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "anorexx",
            "video",
            "father sex",
            "ebony riding",
            "ebony",
            "roberta",
            "type win32",
            "exe size",
            "mb first",
            "file name",
            "sentinelone",
            "present jul",
            "present oct",
            "entries http",
            "memcommit",
            "t1055",
            "read c",
            "search",
            "entries",
            "show",
            "medium",
            "showing",
            "high process",
            "injection t1055",
            "copy",
            "write",
            "win32",
            "malware",
            "tsara brashears",
            "tsara",
            "pornhub",
            "porn videos",
            "watch tsara",
            "most relevant",
            "open threat",
            "exchange",
            "public",
            "https",
            "green",
            "daily",
            "brashears",
            "porn",
            "watch",
            "busty xxx",
            "filter tsara",
            "brashears porn",
            "url add",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "md5 sha256",
            "google safe",
            "browsing",
            "dynamicloader",
            "dynamic",
            "read",
            "delete",
            "mtb apr",
            "trojan",
            "lowfi",
            "virtool",
            "icloader apr",
            "otx telemetry",
            "australia",
            "exploit",
            "cobalt strike",
            "hostile",
            "trojanspy",
            "msil",
            "win64",
            "pulse",
            "alerts",
            "yara rule",
            "named pipe",
            "xe7xf3xf2x14x9d",
            "high",
            "delphi",
            "local",
            "next",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "defense evasion",
            "adversaries",
            "spawns",
            "found",
            "process details",
            "flag",
            "contacted",
            "meta",
            "location united",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "size",
            "beginstring",
            "null",
            "type data",
            "error",
            "span",
            "hybrid",
            "general",
            "click",
            "strings",
            "refresh",
            "tools",
            "pattern match",
            "show technique",
            "mitre att",
            "ck matrix",
            "ascii text",
            "show process",
            "utf8",
            "crlf line",
            "network traffic",
            "path",
            "included",
            "review",
            "excludea",
            "sugges data",
            "typ url",
            "url url",
            "url hos",
            "hos hos",
            "extraction f",
            "enter so",
            "u extractio",
            "extra data",
            "included review",
            "ic excluded",
            "suggeste",
            "pulses",
            "md5 google",
            "safe browsing",
            "virustotal api",
            "comments",
            "ally s",
            "extraction data",
            "enter soudcfidi",
            "ad temdac",
            "cddad ad",
            "praw type",
            "extr",
            "include u",
            "creation date",
            "record value",
            "gmt content",
            "x adblock",
            "certificate",
            "domain",
            "encrypt",
            "sec ch",
            "ch ua",
            "unknown aaaa",
            "ua full",
            "ua platform",
            "present jun",
            "moved",
            "ip address",
            "doctype html",
            "lander script",
            "head",
            "method",
            "allowed date",
            "arizona",
            "scottsdale",
            "go daddy",
            "authority",
            "next associated",
            "extraction fail",
            "enter soupce",
            "udi ad",
            "trydda dada",
            "panca type",
            "ur extraction",
            "s data",
            "pr extract",
            "servers",
            "hostname",
            "files ip",
            "denmark unknown"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CIDR": 4,
            "URL": 7528,
            "domain": 1822,
            "hostname": 2015,
            "email": 5,
            "FileHash-MD5": 373,
            "FileHash-SHA1": 363,
            "FileHash-SHA256": 1939
          },
          "indicator_count": 14049,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "244 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658dd276d03bca9b7a93b724",
          "name": "Makop | Lazarus | Spyware",
          "description": "Privilege abuse. Spyware and miscellaneous cyber attacks leveraged against various individuals using escalated privileges. Pegasus was found, not thoroughly explored.",
          "modified": "2024-01-27T18:02:23.517000",
          "created": "2023-12-28T19:54:30.287000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "iocs",
            "ipv4",
            "filehashmd5",
            "next",
            "scan endpoints",
            "all octoseek",
            "url http",
            "url https",
            "create new",
            "deptid24124",
            "deptid23922",
            "deptid23936",
            "sid339",
            "filehashsha256",
            "navmode3",
            "ommidsf3558",
            "usbuy no",
            "type33554433",
            "guid",
            "smauthreason0",
            "methodhead",
            "targetsmhttps",
            "exact",
            "a9 no",
            "langid1",
            "actmsgs1",
            "christmas",
            "pinlbtn",
            "pinl2",
            "uidtokenhttps",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "filehashsha1",
            "email",
            "contact",
            "contacted",
            "pegasus",
            "T1622 - Debugger Evasion",
            "wmi string",
            "windows nt",
            "request email",
            "apple",
            "search",
            "server",
            "resolutions",
            "san francisco",
            "route",
            "server ca",
            "sha2 secure",
            "show technique",
            "sign",
            "sprint personal",
            "status",
            "ssl certificate",
            "stateprovince",
            "text",
            "test",
            "subdomains",
            "surry hills",
            "teams api",
            "uknown",
            "threat analyzer",
            "threat",
            "target",
            "tsara brashears",
            "united",
            "urls",
            "win64",
            "windir",
            "urls http",
            "v3 serial",
            "validity",
            "referrer",
            "registrar abuse",
            "report",
            "report registrar abuse",
            "ransomware",
            "record value",
            "programfiles",
            "priority",
            "port scan",
            "pe32",
            "pegasus",
            "pe resource",
            "path",
            "paste",
            "passive dns",
            "password",
            "orgtechhandle",
            "orgtechphone",
            "orgtechref",
            "open",
            "orgabusehandle",
            "orgabuseref",
            "asn asn",
            "asn database",
            "bernhardplein",
            "big tech",
            "body xml",
            "body",
            "xml",
            "ck id",
            "cloudflare",
            "as8100",
            "akamai as36786",
            "as16625",
            "arin",
            "analyze",
            "api ip",
            "amazons3",
            "akamaias",
            "akamai",
            "aibv hostmaster",
            "access type",
            "abuse contact",
            "audiologist inc",
            "nothing number",
            "united",
            "brashears",
            "verdict",
            "net10464001",
            "new ioc",
            "next noc",
            "bv",
            "bv  orgid cambridge",
            "cambridge",
            "certificate",
            "certificate city",
            "ck id",
            "city",
            "brute force",
            "communicating",
            "copy core",
            "copy",
            "core",
            "cus",
            "cndigicert",
            "date",
            "detections",
            "detection type",
            "dhs discover",
            "dns",
            "discover",
            "hallrender",
            "briansabey",
            "brian sabey",
            "hall render",
            "dhs",
            "domain name",
            "download",
            "download sample",
            "email",
            "europeberlin",
            "execution",
            "falcon",
            "falcon sandbox",
            "false",
            "feeds",
            "feeds ioc",
            "first",
            "form",
            "frankfurt",
            "full name",
            "gameskinny",
            "gecko",
            "germany",
            "getprocaddress",
            "hacktool",
            "historical ssl",
            "hostnames",
            "hybrid",
            "ibm",
            "ibm business",
            "installer",
            "installer internet",
            "ioc search",
            "iocs",
            "ip address",
            "ip geolocation",
            "stealer",
            "ipinfo",
            "issuer",
            "javascript",
            "jb",
            "jb country",
            "khtml",
            "lazarus",
            "little",
            "lolkek",
            "main",
            "makop",
            "markmonitor",
            "microsoft",
            "mitre att",
            "ms windows",
            "name name"
          ],
          "references": [
            "uat.identityssl.newscdn.com.au",
            "gameskinny.com",
            "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
            "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "Makop Ransomware",
              "display_name": "Makop Ransomware",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Lazarus",
              "display_name": "Lazarus",
              "target": null
            },
            {
              "id": "Little",
              "display_name": "Little",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1559",
              "name": "Inter-Process Communication",
              "display_name": "T1559 - Inter-Process Communication"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2108,
            "FileHash-SHA1": 1248,
            "domain": 668,
            "hostname": 1340,
            "URL": 2652,
            "FileHash-SHA256": 1070,
            "email": 25,
            "CIDR": 4
          },
          "indicator_count": 9115,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "813 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ef84e3324dfdb9d16bd73",
          "name": "Makop | Lazarus | Spyware (if it looks like a Pegasus...)",
          "description": "",
          "modified": "2024-01-27T18:02:23.517000",
          "created": "2023-12-29T16:48:15",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "iocs",
            "ipv4",
            "filehashmd5",
            "next",
            "scan endpoints",
            "all octoseek",
            "url http",
            "url https",
            "create new",
            "deptid24124",
            "deptid23922",
            "deptid23936",
            "sid339",
            "filehashsha256",
            "navmode3",
            "ommidsf3558",
            "usbuy no",
            "type33554433",
            "guid",
            "smauthreason0",
            "methodhead",
            "targetsmhttps",
            "exact",
            "a9 no",
            "langid1",
            "actmsgs1",
            "christmas",
            "pinlbtn",
            "pinl2",
            "uidtokenhttps",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "filehashsha1",
            "email",
            "contact",
            "contacted",
            "pegasus",
            "T1622 - Debugger Evasion",
            "wmi string",
            "windows nt",
            "request email",
            "apple",
            "search",
            "server",
            "resolutions",
            "san francisco",
            "route",
            "server ca",
            "sha2 secure",
            "show technique",
            "sign",
            "sprint personal",
            "status",
            "ssl certificate",
            "stateprovince",
            "text",
            "test",
            "subdomains",
            "surry hills",
            "teams api",
            "uknown",
            "threat analyzer",
            "threat",
            "target",
            "tsara brashears",
            "united",
            "urls",
            "win64",
            "windir",
            "urls http",
            "v3 serial",
            "validity",
            "referrer",
            "registrar abuse",
            "report",
            "report registrar abuse",
            "ransomware",
            "record value",
            "programfiles",
            "priority",
            "port scan",
            "pe32",
            "pegasus",
            "pe resource",
            "path",
            "paste",
            "passive dns",
            "password",
            "orgtechhandle",
            "orgtechphone",
            "orgtechref",
            "open",
            "orgabusehandle",
            "orgabuseref",
            "asn asn",
            "asn database",
            "bernhardplein",
            "big tech",
            "body xml",
            "body",
            "xml",
            "ck id",
            "cloudflare",
            "as8100",
            "akamai as36786",
            "as16625",
            "arin",
            "analyze",
            "api ip",
            "amazons3",
            "akamaias",
            "akamai",
            "aibv hostmaster",
            "access type",
            "abuse contact",
            "audiologist inc",
            "nothing number",
            "united",
            "brashears",
            "verdict",
            "net10464001",
            "new ioc",
            "next noc",
            "bv",
            "bv  orgid cambridge",
            "cambridge",
            "certificate",
            "certificate city",
            "ck id",
            "city",
            "brute force",
            "communicating",
            "copy core",
            "copy",
            "core",
            "cus",
            "cndigicert",
            "date",
            "detections",
            "detection type",
            "dhs discover",
            "dns",
            "discover",
            "hallrender",
            "briansabey",
            "brian sabey",
            "hall render",
            "dhs",
            "domain name",
            "download",
            "download sample",
            "email",
            "europeberlin",
            "execution",
            "falcon",
            "falcon sandbox",
            "false",
            "feeds",
            "feeds ioc",
            "first",
            "form",
            "frankfurt",
            "full name",
            "gameskinny",
            "gecko",
            "germany",
            "getprocaddress",
            "hacktool",
            "historical ssl",
            "hostnames",
            "hybrid",
            "ibm",
            "ibm business",
            "installer",
            "installer internet",
            "ioc search",
            "iocs",
            "ip address",
            "ip geolocation",
            "stealer",
            "ipinfo",
            "issuer",
            "javascript",
            "jb",
            "jb country",
            "khtml",
            "lazarus",
            "little",
            "lolkek",
            "main",
            "makop",
            "markmonitor",
            "microsoft",
            "mitre att",
            "ms windows",
            "name name"
          ],
          "references": [
            "uat.identityssl.newscdn.com.au",
            "gameskinny.com",
            "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
            "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "Makop Ransomware",
              "display_name": "Makop Ransomware",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Lazarus",
              "display_name": "Lazarus",
              "target": null
            },
            {
              "id": "Little",
              "display_name": "Little",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1559",
              "name": "Inter-Process Communication",
              "display_name": "T1559 - Inter-Process Communication"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658dd276d03bca9b7a93b724",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2108,
            "FileHash-SHA1": 1248,
            "domain": 668,
            "hostname": 1340,
            "URL": 2652,
            "FileHash-SHA256": 1070,
            "email": 25,
            "CIDR": 4
          },
          "indicator_count": 9115,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "813 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342",
        "uat.identityssl.newscdn.com.au",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "gameskinny.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Hacktool",
            "Sabey",
            "Brashears",
            "Lazarus",
            "Lolkek",
            "Hallrender",
            "Ransomware",
            "Makop ransomware",
            "Little"
          ],
          "industries": [],
          "unique_indicators": 23473
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/absolutdrinks.com",
    "whois": "http://whois.domaintools.com/absolutdrinks.com",
    "domain": "absolutdrinks.com",
    "hostname": "y982.absolutdrinks.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "687b5499d48de6e54f3bff11",
      "name": "213.174.130.70 - Spyware Install  | Emotet via Malware sites",
      "description": "Malicious IP address for multiple malware domains. Very malicious spyware, will hijack network and devices. \n\u2022 Best Targeted sites \nSpyware Install\n\u2022 Garveep POST CnC\nBeacon\n\u2022 Worm.Mydoom\nCheckin\n\n#endgame #emotet #mydoom #malware_domains #install_spyware #monitered_targets",
      "modified": "2025-08-18T08:00:43.712000",
      "created": "2025-07-19T08:17:29.443000",
      "tags": [
        "handle",
        "ripe ncc",
        "ripe network",
        "address range",
        "cidr",
        "allocation type",
        "assigned pa",
        "status",
        "whois server",
        "entity ah36ripe",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "data",
        "v3 serial",
        "number",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "date",
        "abuse contact",
        "orgid",
        "orgtechhandle",
        "address",
        "orgabuseref",
        "postalcode",
        "ripe",
        "seen",
        "update date",
        "tech email",
        "admin country",
        "expiration date",
        "dnssec",
        "admin id",
        "mi11255597wp",
        "msie",
        "chrome",
        "passive dns",
        "united",
        "ipv4 add",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "hosting",
        "open",
        "body",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "anorexx",
        "video",
        "father sex",
        "ebony riding",
        "ebony",
        "roberta",
        "type win32",
        "exe size",
        "mb first",
        "file name",
        "sentinelone",
        "present jul",
        "present oct",
        "entries http",
        "memcommit",
        "t1055",
        "read c",
        "search",
        "entries",
        "show",
        "medium",
        "showing",
        "high process",
        "injection t1055",
        "copy",
        "write",
        "win32",
        "malware",
        "tsara brashears",
        "tsara",
        "pornhub",
        "porn videos",
        "watch tsara",
        "most relevant",
        "open threat",
        "exchange",
        "public",
        "https",
        "green",
        "daily",
        "brashears",
        "porn",
        "watch",
        "busty xxx",
        "filter tsara",
        "brashears porn",
        "url add",
        "pulse pulses",
        "http",
        "related pulses",
        "none related",
        "tags none",
        "file type",
        "md5 sha256",
        "google safe",
        "browsing",
        "dynamicloader",
        "dynamic",
        "read",
        "delete",
        "mtb apr",
        "trojan",
        "lowfi",
        "virtool",
        "icloader apr",
        "otx telemetry",
        "australia",
        "exploit",
        "cobalt strike",
        "hostile",
        "trojanspy",
        "msil",
        "win64",
        "pulse",
        "alerts",
        "yara rule",
        "named pipe",
        "xe7xf3xf2x14x9d",
        "high",
        "delphi",
        "local",
        "next",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "defense evasion",
        "adversaries",
        "spawns",
        "found",
        "process details",
        "flag",
        "contacted",
        "meta",
        "location united",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "sha1",
        "size",
        "beginstring",
        "null",
        "type data",
        "error",
        "span",
        "hybrid",
        "general",
        "click",
        "strings",
        "refresh",
        "tools",
        "pattern match",
        "show technique",
        "mitre att",
        "ck matrix",
        "ascii text",
        "show process",
        "utf8",
        "crlf line",
        "network traffic",
        "path",
        "included",
        "review",
        "excludea",
        "sugges data",
        "typ url",
        "url url",
        "url hos",
        "hos hos",
        "extraction f",
        "enter so",
        "u extractio",
        "extra data",
        "included review",
        "ic excluded",
        "suggeste",
        "pulses",
        "md5 google",
        "safe browsing",
        "virustotal api",
        "comments",
        "ally s",
        "extraction data",
        "enter soudcfidi",
        "ad temdac",
        "cddad ad",
        "praw type",
        "extr",
        "include u",
        "creation date",
        "record value",
        "gmt content",
        "x adblock",
        "certificate",
        "domain",
        "encrypt",
        "sec ch",
        "ch ua",
        "unknown aaaa",
        "ua full",
        "ua platform",
        "present jun",
        "moved",
        "ip address",
        "doctype html",
        "lander script",
        "head",
        "method",
        "allowed date",
        "arizona",
        "scottsdale",
        "go daddy",
        "authority",
        "next associated",
        "extraction fail",
        "enter soupce",
        "udi ad",
        "trydda dada",
        "panca type",
        "ur extraction",
        "s data",
        "pr extract",
        "servers",
        "hostname",
        "files ip",
        "denmark unknown"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CIDR": 4,
        "URL": 7528,
        "domain": 1822,
        "hostname": 2015,
        "email": 5,
        "FileHash-MD5": 373,
        "FileHash-SHA1": 363,
        "FileHash-SHA256": 1939
      },
      "indicator_count": 14049,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "244 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658dd276d03bca9b7a93b724",
      "name": "Makop | Lazarus | Spyware",
      "description": "Privilege abuse. Spyware and miscellaneous cyber attacks leveraged against various individuals using escalated privileges. Pegasus was found, not thoroughly explored.",
      "modified": "2024-01-27T18:02:23.517000",
      "created": "2023-12-28T19:54:30.287000",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "iocs",
        "ipv4",
        "filehashmd5",
        "next",
        "scan endpoints",
        "all octoseek",
        "url http",
        "url https",
        "create new",
        "deptid24124",
        "deptid23922",
        "deptid23936",
        "sid339",
        "filehashsha256",
        "navmode3",
        "ommidsf3558",
        "usbuy no",
        "type33554433",
        "guid",
        "smauthreason0",
        "methodhead",
        "targetsmhttps",
        "exact",
        "a9 no",
        "langid1",
        "actmsgs1",
        "christmas",
        "pinlbtn",
        "pinl2",
        "uidtokenhttps",
        "pulse use",
        "pdf report",
        "pcap",
        "stix",
        "filehashsha1",
        "email",
        "contact",
        "contacted",
        "pegasus",
        "T1622 - Debugger Evasion",
        "wmi string",
        "windows nt",
        "request email",
        "apple",
        "search",
        "server",
        "resolutions",
        "san francisco",
        "route",
        "server ca",
        "sha2 secure",
        "show technique",
        "sign",
        "sprint personal",
        "status",
        "ssl certificate",
        "stateprovince",
        "text",
        "test",
        "subdomains",
        "surry hills",
        "teams api",
        "uknown",
        "threat analyzer",
        "threat",
        "target",
        "tsara brashears",
        "united",
        "urls",
        "win64",
        "windir",
        "urls http",
        "v3 serial",
        "validity",
        "referrer",
        "registrar abuse",
        "report",
        "report registrar abuse",
        "ransomware",
        "record value",
        "programfiles",
        "priority",
        "port scan",
        "pe32",
        "pegasus",
        "pe resource",
        "path",
        "paste",
        "passive dns",
        "password",
        "orgtechhandle",
        "orgtechphone",
        "orgtechref",
        "open",
        "orgabusehandle",
        "orgabuseref",
        "asn asn",
        "asn database",
        "bernhardplein",
        "big tech",
        "body xml",
        "body",
        "xml",
        "ck id",
        "cloudflare",
        "as8100",
        "akamai as36786",
        "as16625",
        "arin",
        "analyze",
        "api ip",
        "amazons3",
        "akamaias",
        "akamai",
        "aibv hostmaster",
        "access type",
        "abuse contact",
        "audiologist inc",
        "nothing number",
        "united",
        "brashears",
        "verdict",
        "net10464001",
        "new ioc",
        "next noc",
        "bv",
        "bv  orgid cambridge",
        "cambridge",
        "certificate",
        "certificate city",
        "ck id",
        "city",
        "brute force",
        "communicating",
        "copy core",
        "copy",
        "core",
        "cus",
        "cndigicert",
        "date",
        "detections",
        "detection type",
        "dhs discover",
        "dns",
        "discover",
        "hallrender",
        "briansabey",
        "brian sabey",
        "hall render",
        "dhs",
        "domain name",
        "download",
        "download sample",
        "email",
        "europeberlin",
        "execution",
        "falcon",
        "falcon sandbox",
        "false",
        "feeds",
        "feeds ioc",
        "first",
        "form",
        "frankfurt",
        "full name",
        "gameskinny",
        "gecko",
        "germany",
        "getprocaddress",
        "hacktool",
        "historical ssl",
        "hostnames",
        "hybrid",
        "ibm",
        "ibm business",
        "installer",
        "installer internet",
        "ioc search",
        "iocs",
        "ip address",
        "ip geolocation",
        "stealer",
        "ipinfo",
        "issuer",
        "javascript",
        "jb",
        "jb country",
        "khtml",
        "lazarus",
        "little",
        "lolkek",
        "main",
        "makop",
        "markmonitor",
        "microsoft",
        "mitre att",
        "ms windows",
        "name name"
      ],
      "references": [
        "uat.identityssl.newscdn.com.au",
        "gameskinny.com",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "Makop Ransomware",
          "display_name": "Makop Ransomware",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Lazarus",
          "display_name": "Lazarus",
          "target": null
        },
        {
          "id": "Little",
          "display_name": "Little",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1559",
          "name": "Inter-Process Communication",
          "display_name": "T1559 - Inter-Process Communication"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2108,
        "FileHash-SHA1": 1248,
        "domain": 668,
        "hostname": 1340,
        "URL": 2652,
        "FileHash-SHA256": 1070,
        "email": 25,
        "CIDR": 4
      },
      "indicator_count": 9115,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "813 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658ef84e3324dfdb9d16bd73",
      "name": "Makop | Lazarus | Spyware (if it looks like a Pegasus...)",
      "description": "",
      "modified": "2024-01-27T18:02:23.517000",
      "created": "2023-12-29T16:48:15",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "iocs",
        "ipv4",
        "filehashmd5",
        "next",
        "scan endpoints",
        "all octoseek",
        "url http",
        "url https",
        "create new",
        "deptid24124",
        "deptid23922",
        "deptid23936",
        "sid339",
        "filehashsha256",
        "navmode3",
        "ommidsf3558",
        "usbuy no",
        "type33554433",
        "guid",
        "smauthreason0",
        "methodhead",
        "targetsmhttps",
        "exact",
        "a9 no",
        "langid1",
        "actmsgs1",
        "christmas",
        "pinlbtn",
        "pinl2",
        "uidtokenhttps",
        "pulse use",
        "pdf report",
        "pcap",
        "stix",
        "filehashsha1",
        "email",
        "contact",
        "contacted",
        "pegasus",
        "T1622 - Debugger Evasion",
        "wmi string",
        "windows nt",
        "request email",
        "apple",
        "search",
        "server",
        "resolutions",
        "san francisco",
        "route",
        "server ca",
        "sha2 secure",
        "show technique",
        "sign",
        "sprint personal",
        "status",
        "ssl certificate",
        "stateprovince",
        "text",
        "test",
        "subdomains",
        "surry hills",
        "teams api",
        "uknown",
        "threat analyzer",
        "threat",
        "target",
        "tsara brashears",
        "united",
        "urls",
        "win64",
        "windir",
        "urls http",
        "v3 serial",
        "validity",
        "referrer",
        "registrar abuse",
        "report",
        "report registrar abuse",
        "ransomware",
        "record value",
        "programfiles",
        "priority",
        "port scan",
        "pe32",
        "pegasus",
        "pe resource",
        "path",
        "paste",
        "passive dns",
        "password",
        "orgtechhandle",
        "orgtechphone",
        "orgtechref",
        "open",
        "orgabusehandle",
        "orgabuseref",
        "asn asn",
        "asn database",
        "bernhardplein",
        "big tech",
        "body xml",
        "body",
        "xml",
        "ck id",
        "cloudflare",
        "as8100",
        "akamai as36786",
        "as16625",
        "arin",
        "analyze",
        "api ip",
        "amazons3",
        "akamaias",
        "akamai",
        "aibv hostmaster",
        "access type",
        "abuse contact",
        "audiologist inc",
        "nothing number",
        "united",
        "brashears",
        "verdict",
        "net10464001",
        "new ioc",
        "next noc",
        "bv",
        "bv  orgid cambridge",
        "cambridge",
        "certificate",
        "certificate city",
        "ck id",
        "city",
        "brute force",
        "communicating",
        "copy core",
        "copy",
        "core",
        "cus",
        "cndigicert",
        "date",
        "detections",
        "detection type",
        "dhs discover",
        "dns",
        "discover",
        "hallrender",
        "briansabey",
        "brian sabey",
        "hall render",
        "dhs",
        "domain name",
        "download",
        "download sample",
        "email",
        "europeberlin",
        "execution",
        "falcon",
        "falcon sandbox",
        "false",
        "feeds",
        "feeds ioc",
        "first",
        "form",
        "frankfurt",
        "full name",
        "gameskinny",
        "gecko",
        "germany",
        "getprocaddress",
        "hacktool",
        "historical ssl",
        "hostnames",
        "hybrid",
        "ibm",
        "ibm business",
        "installer",
        "installer internet",
        "ioc search",
        "iocs",
        "ip address",
        "ip geolocation",
        "stealer",
        "ipinfo",
        "issuer",
        "javascript",
        "jb",
        "jb country",
        "khtml",
        "lazarus",
        "little",
        "lolkek",
        "main",
        "makop",
        "markmonitor",
        "microsoft",
        "mitre att",
        "ms windows",
        "name name"
      ],
      "references": [
        "uat.identityssl.newscdn.com.au",
        "gameskinny.com",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "Makop Ransomware",
          "display_name": "Makop Ransomware",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Lazarus",
          "display_name": "Lazarus",
          "target": null
        },
        {
          "id": "Little",
          "display_name": "Little",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1559",
          "name": "Inter-Process Communication",
          "display_name": "T1559 - Inter-Process Communication"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658dd276d03bca9b7a93b724",
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2108,
        "FileHash-SHA1": 1248,
        "domain": 668,
        "hostname": 1340,
        "URL": 2652,
        "FileHash-SHA256": 1070,
        "email": 25,
        "CIDR": 4
      },
      "indicator_count": 9115,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "813 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://y982.absolutdrinks.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://y982.absolutdrinks.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776664938.2009528
}