{
  "type": "URL",
  "indicator": "https://z.prototype.be.call",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://z.prototype.be.call",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3262123971,
      "indicator": "https://z.prototype.be.call",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "6891bf5f58c1ae303f6d313e",
          "name": "Jeeng | Powerbox | Tracking | Mirai \u2022 Palantir plugin",
          "description": "#ELF:Mirai-ALC\\ [Trj]\n* [https://d1-myadmin.dpdlocal.co.uk/login]\n\u2022 [cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap]\nAlfper:BrowserModifier:Win32/DeepSync.C\n#prometheus #trojan #malware #elf #mirai dpd #palantir # plugin #tracking #monitoring #call #tracker #spyware #worm #virus #election_ news",
          "modified": "2025-09-04T08:05:56.240000",
          "created": "2025-08-05T08:22:55.113000",
          "tags": [
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "entries",
            "url http",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "iocs",
            "learn more",
            "filehashsha256",
            "types",
            "indicators show",
            "search",
            "present jul",
            "present jun",
            "present may",
            "present aug",
            "present apr",
            "present mar",
            "present feb",
            "united",
            "unknown aaaa",
            "all ipv4",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "open",
            "registrar",
            "limited ta",
            "com laude",
            "nomiq",
            "creation date",
            "ip address",
            "date",
            "domain",
            "hostname",
            "files ip",
            "address",
            "asn as21342",
            "scan",
            "ipv4",
            "pulses",
            "servers",
            "hostname add",
            "pulse submit",
            "url analysis",
            "verdict",
            "france unknown",
            "name servers",
            "present",
            "whois show",
            "record value",
            "domain name",
            "expiration date",
            "status",
            "domain add",
            "filehashmd5",
            "idhttp",
            "tidcustomhttp",
            "classes",
            "medium",
            "crlf line",
            "show",
            "registry",
            "service",
            "copy",
            "patch",
            "write",
            "next",
            "markus",
            "delphi",
            "win32",
            "persistence",
            "execution",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "refresh57959",
            "windows xp",
            "pack",
            "shows",
            "cc08",
            "f06a6b",
            "pulses hostname",
            "germany unknown",
            "aaaa",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "spawns",
            "development att",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "ascii text",
            "pattern match",
            "mitre att",
            "show technique",
            "format",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "filehashsha1",
            "palantir feb",
            "difference feb"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3809,
            "hostname": 1197,
            "domain": 456,
            "FileHash-MD5": 170,
            "FileHash-SHA256": 579,
            "FileHash-SHA1": 161,
            "CVE": 1,
            "email": 1,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 6380,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "227 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e1ca167a1591e7b4ca1129",
          "name": "VirusTotal view-source on https://www.virustotal.com/en/file/undefined/analysis/",
          "description": "someone really needs to figure out wtf this is all doing it has to be part of the net.sh",
          "modified": "2022-07-28T02:05:04.183000",
          "created": "2022-07-27T23:28:22.504000",
          "tags": [
            "array",
            "object",
            "typeof t",
            "layer1",
            "error",
            "path",
            "function",
            "typeerror",
            "date",
            "svg export",
            "span",
            "null",
            "unknown",
            "click",
            "february",
            "april",
            "june",
            "august",
            "this",
            "void",
            "bounce",
            "string",
            "regexp",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "notfound",
            "contenttype",
            "form",
            "copyright",
            "element",
            "polymer project",
            "authors",
            "bsd style",
            "code",
            "google",
            "software",
            "window",
            "generator",
            "comment",
            "trident",
            "typeof e",
            "typeof symbol",
            "typeof btoa",
            "btoa",
            "typeof reflect",
            "boolean",
            "customevent",
            "plugin",
            "build",
            "home",
            "intelligence",
            "graph",
            "report",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/en/file/undefined/analysis/",
            "net.sh"
          ],
          "references": [
            "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
            "14.main.bundle.91f9f7ff635e0b797de3.js",
            "5.main.bundle.e92e5e24e074f9c2a52b.js",
            "0.main.bundle.a9d68f5204cd3ac257b6.js",
            "webcomponent-polyfill.js",
            "analytics.js",
            "12.main.bundle.50be73a11d1d3745a5ee.js",
            "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
            "https://www.virustotal.com/en/file/undefined/analysis/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1538,
            "FileHash-SHA256": 138,
            "hostname": 363,
            "domain": 235
          },
          "indicator_count": 2274,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1361 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628e790d414886e18b33c262",
          "name": "either emotet or a part of it",
          "description": "var a.tldDomains, AWIN.Tracking.com, has a new name for its basket, but how do you find it in your browser?.. and what does this mean?",
          "modified": "2022-06-24T00:01:00.706000",
          "created": "2022-05-25T18:44:29.280000",
          "tags": [
            "tfunction",
            "cnullvvoid",
            "wnullgvoid",
            "bnullhvoid",
            "gnullcvoid",
            "guidewrapper",
            "blog",
            "lfunction",
            "hotjar",
            "iab2",
            "code",
            "number",
            "party",
            "n strictly",
            "life spann",
            "azuren n",
            "cookie tracking",
            "tablen n",
            "n cookies",
            "cookie",
            "null",
            "date",
            "error",
            "ffffff",
            "typeof t",
            "uint16array",
            "regexp",
            "uint8array",
            "array",
            "uint32array",
            "helvetica",
            "void",
            "execution",
            "body",
            "roboto",
            "prop",
            "object",
            "param",
            "cookies",
            "getcookie",
            "name",
            "typeof",
            "uri component",
            "obj2",
            "typeof e",
            "webkit",
            "component",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "function",
            "typeof n",
            "typeof window",
            "uuidv4",
            "ajsanonymousid",
            "suffix",
            "bill",
            "viewed",
            "pavel krayzel",
            "psd2",
            "bt prorata",
            "amex",
            "squad",
            "march",
            "new visitors",
            "promise",
            "nthis",
            "eventprocessor",
            "typeof define",
            "info",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "window",
            "value",
            "customevent",
            "image",
            "samesitelax",
            "invalid pixel",
            "snap",
            "afaf09",
            "sfunction",
            "cfunction",
            "post",
            "appcuesdeps",
            "typeerror",
            "hki3",
            "ogr1",
            "typeof self",
            "full selector",
            "heatmaps",
            "sans",
            "version",
            "releaseid",
            "appcues",
            "dashboard2",
            "dashboard3",
            "technology",
            "selector",
            "click",
            "next",
            "import",
            "generic",
            "started",
            "dismissed",
            "completed",
            "contextual help",
            "symbol",
            "appcuesfunction",
            "widget",
            "iframe",
            "pnull",
            "html",
            "style",
            "ctnull",
            "fanull",
            "license",
            "ynull",
            "config",
            "meta",
            "accept",
            "contabo gmbh",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "safari",
            "firefox",
            "chrome",
            "remove",
            "edge",
            "correct",
            "section",
            "segoe ui",
            "emoji",
            "opera",
            "path",
            "span",
            "this",
            "typeof document",
            "small",
            "blank",
            "pass",
            "core",
            "footer",
            "close",
            "form",
            "main",
            "direct",
            "reduceright",
            "string",
            "f420",
            "gyfpnzbgtf3",
            "copyright",
            "json",
            "sesprops",
            "href",
            "input",
            "class",
            "logger",
            "target",
            "push",
            "awalt",
            "awinawin",
            "explorer",
            "awatp",
            "ccampid",
            "impid",
            "tag1"
          ],
          "references": [
            "https://www.dwin1.com/13976.js",
            "https://cdn.heapanalytics.com/js/heap-3501642718.js",
            "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
            "https://contabo.com/client/client.a529db28.js",
            "https://contabo.com/client/client-30e55c50.css",
            "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
            "https://l.clarity.ms/s/0.6.34/clarity.js",
            "https://www.clarity.ms/tag/uet/5739677",
            "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
            "https://fast.appcues.com/79878.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
            "https://sc-static.net/scevent.min.js",
            "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
            "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
            "https://www.hotjar.com/ensureSegmentId.js",
            "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
            "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
            "https://www.hotjar.com/persistUtmParams.js",
            "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
            "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
            "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 349,
            "hostname": 456,
            "URL": 1730,
            "FileHash-SHA256": 342,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1395 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626224efc28c918470fa07ed",
          "name": "inflect.com - malware",
          "description": "var e,t, r.o, is a new type of code, which can be used to build a website, but can't do so without a special code.. and the following:",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-22T03:45:51.681000",
          "tags": [
            "object",
            "typeof symbol",
            "typeerror",
            "html",
            "body",
            "software",
            "pops",
            "width",
            "error",
            "provider",
            "null",
            "code",
            "trident",
            "trcomponent",
            "typeof t",
            "referenceerror",
            "component",
            "date",
            "array",
            "header",
            "contact",
            "backspace",
            "next",
            "footer",
            "copy",
            "february",
            "april",
            "june",
            "august",
            "open",
            "project",
            "this",
            "unknown",
            "heapdeps",
            "number",
            "hki3",
            "ogr1",
            "function",
            "regexp",
            "typeof self",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "string",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "typeof e",
            "sesprops",
            "nthis",
            "href",
            "image",
            "input",
            "class",
            "logger",
            "download",
            "target",
            "form",
            "push"
          ],
          "references": [
            "xfe-URL-inflect.com-stix2-2.1-export.json",
            "https://cdn.heapanalytics.com/js/heap-2001511295.js",
            "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
            "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrComponent",
              "display_name": "TrComponent",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1064,
            "FileHash-SHA256": 222,
            "hostname": 162,
            "domain": 294
          },
          "indicator_count": 1742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js",
        "0.main.bundle.a9d68f5204cd3ac257b6.js",
        "https://www.clarity.ms/tag/uet/5739677",
        "analytics.js",
        "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js",
        "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
        "https://fast.appcues.com/79878.js",
        "https://www.hotjar.com/ensureSegmentId.js",
        "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
        "https://l.clarity.ms/s/0.6.34/clarity.js",
        "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
        "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
        "5.main.bundle.e92e5e24e074f9c2a52b.js",
        "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
        "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
        "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
        "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
        "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
        "webcomponent-polyfill.js",
        "https://cdn.heapanalytics.com/js/heap-3501642718.js",
        "https://contabo.com/client/client.a529db28.js",
        "https://www.hotjar.com/persistUtmParams.js",
        "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
        "12.main.bundle.50be73a11d1d3745a5ee.js",
        "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
        "14.main.bundle.91f9f7ff635e0b797de3.js",
        "https://sc-static.net/scevent.min.js",
        "https://connect.facebook.net/en_US/fbevents.js",
        "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
        "https://www.dwin1.com/13976.js",
        "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
        "https://contabo.com/client/client-30e55c50.css",
        "https://cdn.heapanalytics.com/js/heap-2001511295.js",
        "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
        "xfe-URL-inflect.com-stix2-2.1-export.json",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
        "https://www.virustotal.com/en/file/undefined/analysis/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trcomponent",
            "Reduceright"
          ],
          "industries": [],
          "unique_indicators": 67725
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/be.call",
    "whois": "http://whois.domaintools.com/be.call",
    "domain": "be.call",
    "hostname": "z.prototype.be.call"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "6891bf5f58c1ae303f6d313e",
      "name": "Jeeng | Powerbox | Tracking | Mirai \u2022 Palantir plugin",
      "description": "#ELF:Mirai-ALC\\ [Trj]\n* [https://d1-myadmin.dpdlocal.co.uk/login]\n\u2022 [cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap]\nAlfper:BrowserModifier:Win32/DeepSync.C\n#prometheus #trojan #malware #elf #mirai dpd #palantir # plugin #tracking #monitoring #call #tracker #spyware #worm #virus #election_ news",
      "modified": "2025-09-04T08:05:56.240000",
      "created": "2025-08-05T08:22:55.113000",
      "tags": [
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "entries",
        "url http",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "iocs",
        "learn more",
        "filehashsha256",
        "types",
        "indicators show",
        "search",
        "present jul",
        "present jun",
        "present may",
        "present aug",
        "present apr",
        "present mar",
        "present feb",
        "united",
        "unknown aaaa",
        "all ipv4",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "open",
        "registrar",
        "limited ta",
        "com laude",
        "nomiq",
        "creation date",
        "ip address",
        "date",
        "domain",
        "hostname",
        "files ip",
        "address",
        "asn as21342",
        "scan",
        "ipv4",
        "pulses",
        "servers",
        "hostname add",
        "pulse submit",
        "url analysis",
        "verdict",
        "france unknown",
        "name servers",
        "present",
        "whois show",
        "record value",
        "domain name",
        "expiration date",
        "status",
        "domain add",
        "filehashmd5",
        "idhttp",
        "tidcustomhttp",
        "classes",
        "medium",
        "crlf line",
        "show",
        "registry",
        "service",
        "copy",
        "patch",
        "write",
        "next",
        "markus",
        "delphi",
        "win32",
        "persistence",
        "execution",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "refresh57959",
        "windows xp",
        "pack",
        "shows",
        "cc08",
        "f06a6b",
        "pulses hostname",
        "germany unknown",
        "aaaa",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "spawns",
        "development att",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "ascii text",
        "pattern match",
        "mitre att",
        "show technique",
        "format",
        "august",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "filehashsha1",
        "palantir feb",
        "difference feb"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3809,
        "hostname": 1197,
        "domain": 456,
        "FileHash-MD5": 170,
        "FileHash-SHA256": 579,
        "FileHash-SHA1": 161,
        "CVE": 1,
        "email": 1,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 6380,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "227 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ef0cdb40fa0e7d239ca",
      "name": "either emotet or a part of it",
      "description": "",
      "modified": "2023-12-06T15:10:40.867000",
      "created": "2023-12-06T15:10:40.867000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 342,
        "hostname": 456,
        "domain": 349,
        "URL": 1730,
        "FileHash-MD5": 1,
        "FileHash-SHA1": 1
      },
      "indicator_count": 2879,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707e5b7df6f60133e8fb50",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2023-12-06T13:59:55.129000",
      "created": "2023-12-06T13:59:55.129000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "hostname": 3584,
        "URL": 13548,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "email": 19,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "62e1ca167a1591e7b4ca1129",
      "name": "VirusTotal view-source on https://www.virustotal.com/en/file/undefined/analysis/",
      "description": "someone really needs to figure out wtf this is all doing it has to be part of the net.sh",
      "modified": "2022-07-28T02:05:04.183000",
      "created": "2022-07-27T23:28:22.504000",
      "tags": [
        "array",
        "object",
        "typeof t",
        "layer1",
        "error",
        "path",
        "function",
        "typeerror",
        "date",
        "svg export",
        "span",
        "null",
        "unknown",
        "click",
        "february",
        "april",
        "june",
        "august",
        "this",
        "void",
        "bounce",
        "string",
        "regexp",
        "number",
        "sxa0",
        "amptoken",
        "optout",
        "notfound",
        "contenttype",
        "form",
        "copyright",
        "element",
        "polymer project",
        "authors",
        "bsd style",
        "code",
        "google",
        "software",
        "window",
        "generator",
        "comment",
        "trident",
        "typeof e",
        "typeof symbol",
        "typeof btoa",
        "btoa",
        "typeof reflect",
        "boolean",
        "customevent",
        "plugin",
        "build",
        "home",
        "intelligence",
        "graph",
        "report",
        "urls",
        "please",
        "javascript",
        "https://www.virustotal.com/en/file/undefined/analysis/",
        "net.sh"
      ],
      "references": [
        "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
        "14.main.bundle.91f9f7ff635e0b797de3.js",
        "5.main.bundle.e92e5e24e074f9c2a52b.js",
        "0.main.bundle.a9d68f5204cd3ac257b6.js",
        "webcomponent-polyfill.js",
        "analytics.js",
        "12.main.bundle.50be73a11d1d3745a5ee.js",
        "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
        "https://www.virustotal.com/en/file/undefined/analysis/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1538,
        "FileHash-SHA256": 138,
        "hostname": 363,
        "domain": 235
      },
      "indicator_count": 2274,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 391,
      "modified_text": "1361 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "628e790d414886e18b33c262",
      "name": "either emotet or a part of it",
      "description": "var a.tldDomains, AWIN.Tracking.com, has a new name for its basket, but how do you find it in your browser?.. and what does this mean?",
      "modified": "2022-06-24T00:01:00.706000",
      "created": "2022-05-25T18:44:29.280000",
      "tags": [
        "tfunction",
        "cnullvvoid",
        "wnullgvoid",
        "bnullhvoid",
        "gnullcvoid",
        "guidewrapper",
        "blog",
        "lfunction",
        "hotjar",
        "iab2",
        "code",
        "number",
        "party",
        "n strictly",
        "life spann",
        "azuren n",
        "cookie tracking",
        "tablen n",
        "n cookies",
        "cookie",
        "null",
        "date",
        "error",
        "ffffff",
        "typeof t",
        "uint16array",
        "regexp",
        "uint8array",
        "array",
        "uint32array",
        "helvetica",
        "void",
        "execution",
        "body",
        "roboto",
        "prop",
        "object",
        "param",
        "cookies",
        "getcookie",
        "name",
        "typeof",
        "uri component",
        "obj2",
        "typeof e",
        "webkit",
        "component",
        "typeof y",
        "typeof symbol",
        "suspense",
        "context",
        "forwardref",
        "unknown",
        "4096",
        "function",
        "typeof n",
        "typeof window",
        "uuidv4",
        "ajsanonymousid",
        "suffix",
        "bill",
        "viewed",
        "pavel krayzel",
        "psd2",
        "bt prorata",
        "amex",
        "squad",
        "march",
        "new visitors",
        "promise",
        "nthis",
        "eventprocessor",
        "typeof define",
        "info",
        "functional",
        "member",
        "hnew regexp",
        "qfunction",
        "adview",
        "addbillinginfo",
        "addtocart",
        "addtolist",
        "contact",
        "download",
        "install",
        "window",
        "value",
        "customevent",
        "image",
        "samesitelax",
        "invalid pixel",
        "snap",
        "afaf09",
        "sfunction",
        "cfunction",
        "post",
        "appcuesdeps",
        "typeerror",
        "hki3",
        "ogr1",
        "typeof self",
        "full selector",
        "heatmaps",
        "sans",
        "version",
        "releaseid",
        "appcues",
        "dashboard2",
        "dashboard3",
        "technology",
        "selector",
        "click",
        "next",
        "import",
        "generic",
        "started",
        "dismissed",
        "completed",
        "contextual help",
        "symbol",
        "appcuesfunction",
        "widget",
        "iframe",
        "pnull",
        "html",
        "style",
        "ctnull",
        "fanull",
        "license",
        "ynull",
        "config",
        "meta",
        "accept",
        "contabo gmbh",
        "typeof hj",
        "https",
        "learn",
        "surveyv2",
        "surveyisolated",
        "safari",
        "firefox",
        "chrome",
        "remove",
        "edge",
        "correct",
        "section",
        "segoe ui",
        "emoji",
        "opera",
        "path",
        "span",
        "this",
        "typeof document",
        "small",
        "blank",
        "pass",
        "core",
        "footer",
        "close",
        "form",
        "main",
        "direct",
        "reduceright",
        "string",
        "f420",
        "gyfpnzbgtf3",
        "copyright",
        "json",
        "sesprops",
        "href",
        "input",
        "class",
        "logger",
        "target",
        "push",
        "awalt",
        "awinawin",
        "explorer",
        "awatp",
        "ccampid",
        "impid",
        "tag1"
      ],
      "references": [
        "https://www.dwin1.com/13976.js",
        "https://cdn.heapanalytics.com/js/heap-3501642718.js",
        "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
        "https://contabo.com/client/client.a529db28.js",
        "https://contabo.com/client/client-30e55c50.css",
        "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
        "https://l.clarity.ms/s/0.6.34/clarity.js",
        "https://www.clarity.ms/tag/uet/5739677",
        "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
        "https://fast.appcues.com/79878.js",
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
        "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
        "https://sc-static.net/scevent.min.js",
        "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
        "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
        "https://www.hotjar.com/ensureSegmentId.js",
        "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
        "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
        "https://www.hotjar.com/persistUtmParams.js",
        "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
        "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
        "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ReduceRight",
          "display_name": "ReduceRight",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 349,
        "hostname": 456,
        "URL": 1730,
        "FileHash-SHA256": 342,
        "FileHash-MD5": 1,
        "FileHash-SHA1": 1
      },
      "indicator_count": 2879,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1395 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "620c3b1f8af7ea0dcf2c1218",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2022-06-12T22:01:23.105000",
      "created": "2022-02-15T23:45:35.234000",
      "tags": [
        "Jeeng",
        "tim pool",
        "timcast"
      ],
      "references": [
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scnrscnr",
        "id": "126475",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "URL": 13548,
        "hostname": 3584,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "CVE": 3,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "email": 19,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 97,
      "modified_text": "1406 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "626224efc28c918470fa07ed",
      "name": "inflect.com - malware",
      "description": "var e,t, r.o, is a new type of code, which can be used to build a website, but can't do so without a special code.. and the following:",
      "modified": "2022-05-21T00:03:44.725000",
      "created": "2022-04-22T03:45:51.681000",
      "tags": [
        "object",
        "typeof symbol",
        "typeerror",
        "html",
        "body",
        "software",
        "pops",
        "width",
        "error",
        "provider",
        "null",
        "code",
        "trident",
        "trcomponent",
        "typeof t",
        "referenceerror",
        "component",
        "date",
        "array",
        "header",
        "contact",
        "backspace",
        "next",
        "footer",
        "copy",
        "february",
        "april",
        "june",
        "august",
        "open",
        "project",
        "this",
        "unknown",
        "heapdeps",
        "number",
        "hki3",
        "ogr1",
        "function",
        "regexp",
        "typeof self",
        "typeof",
        "facebook pixel",
        "pixel code",
        "symbol",
        "iterator",
        "constantvalue",
        "globalvariable",
        "facebook",
        "string",
        "boolean",
        "service",
        "phonenumber",
        "meta",
        "typeof e",
        "sesprops",
        "nthis",
        "href",
        "image",
        "input",
        "class",
        "logger",
        "download",
        "target",
        "form",
        "push"
      ],
      "references": [
        "xfe-URL-inflect.com-stix2-2.1-export.json",
        "https://cdn.heapanalytics.com/js/heap-2001511295.js",
        "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
        "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrComponent",
          "display_name": "TrComponent",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1064,
        "FileHash-SHA256": 222,
        "hostname": 162,
        "domain": 294
      },
      "indicator_count": 1742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1429 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://z.prototype.be.call",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://z.prototype.be.call",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629943.639541
}