{
  "type": "URL",
  "indicator": "https://zewangjixie888.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://zewangjixie888.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3659420448,
      "indicator": "https://zewangjixie888.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 19,
      "pulses": [
        {
          "id": "65a4885e735b9e8ba94805bc",
          "name": "Apple | Worm:Win32/Benjamin | thebrotherssabey.com",
          "description": "",
          "modified": "2024-09-05T06:51:42.608000",
          "created": "2024-01-15T01:20:30.730000",
          "tags": [
            "execution",
            "whois record",
            "contacted",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "copy",
            "historical ssl",
            "referrer",
            "urls url",
            "icmp",
            "malicious",
            "installer",
            "problems",
            "collections",
            "report",
            "phishing",
            "service tool",
            "greatness",
            "threat network",
            "emotet",
            "magniber",
            "startpage",
            "attack",
            "banker",
            "keylogger",
            "namecheap inc",
            "com laude",
            "ltd dba",
            "cloudflare",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "domains",
            "computer",
            "company limited",
            "first",
            "cloudflarenet",
            "google",
            "amazon02",
            "akamaias",
            "telecom italia",
            "utc submissions",
            "microsoftcorpas",
            "indonesia",
            "beijing gu",
            "appleaustin",
            "sucurisec",
            "amazonaes",
            "limited",
            "tsara brashears",
            "pornhub",
            "thebrotherssabey",
            "then brothers sabey",
            "brian sabey",
            "apple",
            "icloud",
            "apple engineering",
            "soc",
            "hacker",
            "teams",
            "malvertizing",
            "cyberthreat",
            "cyber crime",
            "data",
            "v3 serial",
            "number",
            "cgb stgreater",
            "ecc domain",
            "server ca",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "remote",
            "remote attacker",
            "benjamin",
            "worm",
            "trojan",
            "win32",
            "trojanspy",
            "ransomware",
            "command and control",
            "cnc",
            "c2",
            "stealer",
            "password",
            "apple unlocker",
            "pornographers",
            "cyber stalking",
            "revenge rat",
            "masquerading",
            "scanning host",
            "phishing",
            "dns",
            "network",
            "cobalt strike",
            "mitre attack",
            "metro hacker",
            "t-mobile hacker",
            "stalker",
            "social engineering",
            "et",
            "torrent trecker",
            "view",
            "duckdns",
            "blackhat",
            "data center",
            "tracking",
            "illegal",
            "malware scripting",
            "malware spreader",
            "network rat",
            "multiple botnetworks"
          ],
          "references": [
            "https://thebrotherssabey.wordpress.com/",
            "acam-mdn.apple.com",
            "beacons.bcp.gvt.com",
            "cpcontacts.webcamara.online",
            "http://dreamsofspanking.com/scene/item/rosie-backlash-caning?utm_campaign=apr15",
            "http://ti.hicloudcam.com",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://search.app.goo.gl/?ofl",
            "Worm:Win32/Benjamin",
            "FileHash-SHA256\t00000254e6344d34a1e4ef157cb01d8b7efa65c22c996f9dfe85e7482c6c86ab",
            "FileHash-MD5\ted5c771224fbd6f9b2c0cf1e8cce09b5",
            "FileHash-SHA1\tf336b50f5cca2ddc0341e2c4001b419a830d27a5",
            "applemusic-spotlight.myunidays.com",
            "nr-data.net",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4",
            "blackhat.store",
            "api.telegram.org",
            "cobaltstrike4.tk | https://cobaltstrike4.tk:8443/include/template/isx.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
              "display_name": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Silk",
              "display_name": "Silk",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a429795adf468b427a3c8b",
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2469,
            "URL": 6038,
            "FileHash-MD5": 169,
            "FileHash-SHA1": 157,
            "FileHash-SHA256": 3922,
            "CIDR": 2,
            "hostname": 2787,
            "email": 2,
            "CVE": 1
          },
          "indicator_count": 15547,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "591 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a429795adf468b427a3c8b",
          "name": "Apple | Worm:Win32/Benjamin | thebrotherssabey.com",
          "description": "Retaliation. Brian Sabey representing as an attorney and many other occupations contacted and socially engineered target. Uncertain of true name. Contacted 'alleged' SA assault victim. Made claims of representing a Jeffrey Scott Reimer DPT' alleged 'S' Assaulter.  Substantiated claims made with the twist of 'victim consented'. Mark Brian Sbabeys claims dismissed. Continues to hack, harass, intimidate target in every possible way. Hacking, monitoring, service, modification, phone contact, malicious texting, in person monitoring via colleagues, hacks into medical and medical billing centers, sells/leaks targets data on dark web.    Removed targets name from most pulses via  remote device access. Self whitelist. Everything he does is illegal.\n\nTarget not important enough to law enforcement.",
          "modified": "2024-02-13T17:04:19.437000",
          "created": "2024-01-14T18:35:37.757000",
          "tags": [
            "execution",
            "whois record",
            "contacted",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "copy",
            "historical ssl",
            "referrer",
            "urls url",
            "icmp",
            "malicious",
            "installer",
            "problems",
            "collections",
            "report",
            "phishing",
            "service tool",
            "greatness",
            "threat network",
            "emotet",
            "magniber",
            "startpage",
            "attack",
            "banker",
            "keylogger",
            "namecheap inc",
            "com laude",
            "ltd dba",
            "cloudflare",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "domains",
            "computer",
            "company limited",
            "first",
            "cloudflarenet",
            "google",
            "amazon02",
            "akamaias",
            "telecom italia",
            "utc submissions",
            "microsoftcorpas",
            "indonesia",
            "beijing gu",
            "appleaustin",
            "sucurisec",
            "amazonaes",
            "limited",
            "tsara brashears",
            "pornhub",
            "thebrotherssabey",
            "then brothers sabey",
            "brian sabey",
            "apple",
            "icloud",
            "apple engineering",
            "soc",
            "hacker",
            "teams",
            "malvertizing",
            "cyberthreat",
            "cyber crime",
            "data",
            "v3 serial",
            "number",
            "cgb stgreater",
            "ecc domain",
            "server ca",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "remote",
            "remote attacker",
            "benjamin",
            "worm",
            "trojan",
            "win32",
            "trojanspy",
            "ransomware",
            "command and control",
            "cnc",
            "c2",
            "stealer",
            "password",
            "apple unlocker",
            "pornographers",
            "cyber stalking",
            "revenge rat",
            "masquerading",
            "scanning host",
            "phishing",
            "dns",
            "network",
            "cobalt strike",
            "mitre attack",
            "metro hacker",
            "t-mobile hacker",
            "stalker",
            "social engineering",
            "et",
            "torrent trecker",
            "view",
            "duckdns",
            "blackhat",
            "data center",
            "tracking",
            "illegal",
            "malware scripting",
            "malware spreader",
            "network rat",
            "multiple botnetworks"
          ],
          "references": [
            "https://thebrotherssabey.wordpress.com/",
            "acam-mdn.apple.com",
            "beacons.bcp.gvt.com",
            "cpcontacts.webcamara.online",
            "http://dreamsofspanking.com/scene/item/rosie-backlash-caning?utm_campaign=apr15",
            "http://ti.hicloudcam.com",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://search.app.goo.gl/?ofl",
            "Worm:Win32/Benjamin",
            "FileHash-SHA256\t00000254e6344d34a1e4ef157cb01d8b7efa65c22c996f9dfe85e7482c6c86ab",
            "FileHash-MD5\ted5c771224fbd6f9b2c0cf1e8cce09b5",
            "FileHash-SHA1\tf336b50f5cca2ddc0341e2c4001b419a830d27a5",
            "applemusic-spotlight.myunidays.com",
            "nr-data.net",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4",
            "blackhat.store",
            "api.telegram.org",
            "cobaltstrike4.tk | https://cobaltstrike4.tk:8443/include/template/isx.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
              "display_name": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Silk",
              "display_name": "Silk",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2462,
            "URL": 5950,
            "FileHash-MD5": 168,
            "FileHash-SHA1": 156,
            "FileHash-SHA256": 3901,
            "CIDR": 2,
            "hostname": 2766,
            "email": 2,
            "CVE": 1
          },
          "indicator_count": 15408,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2f9200337f0d1fa195ada",
          "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
          "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
          "modified": "2024-02-12T20:02:49.516000",
          "created": "2024-01-13T20:57:04.197000",
          "tags": [
            "default",
            "show",
            "regsetvalueexa",
            "search",
            "regdword",
            "medium",
            "settingswpad",
            "delete",
            "ids detections",
            "yara detections",
            "worm",
            "malware",
            "copy",
            "write",
            "win32",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "graph community",
            "productidis",
            "urls",
            "mb iesettings",
            "related file",
            "cybersecurity",
            "agency",
            "csc corporate",
            "domains",
            "tucows domains",
            "nameweb bvba",
            "tucows",
            "google",
            "amazon02",
            "twitter",
            "ovh sas",
            "facebook",
            "incapsula",
            "optimizer",
            "activator",
            "kb program",
            "mb super",
            "kb acrotray",
            "1tzv",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "checks_debugger",
            "network_icmp",
            "network_smtp",
            "persistence_autorun",
            "modifies_proxy_wpad",
            "antivm_queries_computername",
            "dumped_buffer",
            "network_http",
            "antivm_network_adapters",
            "smtp_gmail",
            "attacking",
            "browser",
            "object",
            "deleted",
            "deleting",
            "deleted virustotal graphs",
            "corruption",
            "legal",
            "gvt",
            "adams co",
            "colorado",
            "law",
            "illegal practices",
            "hacking",
            "enter rexxfield",
            "roberts",
            "smith",
            "script urls",
            "as20940",
            "united",
            "a domains",
            "certificate",
            "showing",
            "entries",
            "entrust",
            "scan endpoints",
            "district",
            "as16625 akamai",
            "aaaa",
            "passive dns",
            "united kingdom",
            "whitelisted",
            "modification",
            "silence",
            "state",
            "hostname",
            "samples",
            "cover up",
            "silencing",
            "Iowa.gov",
            "dga",
            "fcc",
            "unsigned",
            "remote",
            "wiper",
            "nosy pega",
            "trojan",
            "unknown",
            "access denied",
            "servers",
            "creation date",
            "date",
            "next",
            "apple",
            "ssl certificate",
            "threat roundup",
            "march",
            "october",
            "july",
            "april",
            "whois record",
            "june",
            "roundup",
            "september",
            "august",
            "plugx",
            "goldfinder",
            "sibot",
            "hacktool",
            "february",
            "regsz",
            "english",
            "nsisinetc",
            "mozilla",
            "adobe air",
            "java",
            "http",
            "post http",
            "updater",
            "meta",
            "suspicious",
            "persistence",
            "execution",
            "referrer",
            "communicating",
            "skynet",
            "malicious",
            "gen.o",
            "dynamicloader",
            "cape",
            "enosch malware",
            "enosch",
            "music",
            "contacted",
            "pe resource",
            "resolutions",
            "siblings",
            "urls http"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
            "https://www.google.com/?authuser=0",
            "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
            "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
            "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
            "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
            "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
            "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
            "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
            "Domains Contacted: smtp.gmail.com www.google.com",
            "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
            "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
            "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
            "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Netherlands",
            "Spain",
            "Australia",
            "Korea, Republic of",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Nullsoft_NSIS",
              "display_name": "Nullsoft_NSIS",
              "target": null
            },
            {
              "id": "Win32:Agent-ASTI\\ [Trj]",
              "display_name": "Win32:Agent-ASTI\\ [Trj]",
              "target": null
            },
            {
              "id": "Worm:Win32/Enosch!atmn",
              "display_name": "Worm:Win32/Enosch!atmn",
              "target": "/malware/Worm:Win32/Enosch!atmn"
            },
            {
              "id": "Win.Trojan.Agent-357800",
              "display_name": "Win.Trojan.Agent-357800",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 1512,
            "FileHash-SHA256": 5351,
            "SSLCertFingerprint": 1,
            "URL": 1774,
            "email": 7,
            "hostname": 1170,
            "domain": 1209
          },
          "indicator_count": 13725,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2f9169d6996c1c928ac0b",
          "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
          "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
          "modified": "2024-02-12T20:02:49.516000",
          "created": "2024-01-13T20:56:54.333000",
          "tags": [
            "default",
            "show",
            "regsetvalueexa",
            "search",
            "regdword",
            "medium",
            "settingswpad",
            "delete",
            "ids detections",
            "yara detections",
            "worm",
            "malware",
            "copy",
            "write",
            "win32",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "graph community",
            "productidis",
            "urls",
            "mb iesettings",
            "related file",
            "cybersecurity",
            "agency",
            "csc corporate",
            "domains",
            "tucows domains",
            "nameweb bvba",
            "tucows",
            "google",
            "amazon02",
            "twitter",
            "ovh sas",
            "facebook",
            "incapsula",
            "optimizer",
            "activator",
            "kb program",
            "mb super",
            "kb acrotray",
            "1tzv",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "checks_debugger",
            "network_icmp",
            "network_smtp",
            "persistence_autorun",
            "modifies_proxy_wpad",
            "antivm_queries_computername",
            "dumped_buffer",
            "network_http",
            "antivm_network_adapters",
            "smtp_gmail",
            "attacking",
            "browser",
            "object",
            "deleted",
            "deleting",
            "deleted virustotal graphs",
            "corruption",
            "legal",
            "gvt",
            "adams co",
            "colorado",
            "law",
            "illegal practices",
            "hacking",
            "enter rexxfield",
            "roberts",
            "smith",
            "script urls",
            "as20940",
            "united",
            "a domains",
            "certificate",
            "showing",
            "entries",
            "entrust",
            "scan endpoints",
            "district",
            "as16625 akamai",
            "aaaa",
            "passive dns",
            "united kingdom",
            "whitelisted",
            "modification",
            "silence",
            "state",
            "hostname",
            "samples",
            "cover up",
            "silencing",
            "Iowa.gov",
            "dga",
            "fcc",
            "unsigned",
            "remote",
            "wiper",
            "nosy pega",
            "trojan",
            "unknown",
            "access denied",
            "servers",
            "creation date",
            "date",
            "next",
            "apple",
            "ssl certificate",
            "threat roundup",
            "march",
            "october",
            "july",
            "april",
            "whois record",
            "june",
            "roundup",
            "september",
            "august",
            "plugx",
            "goldfinder",
            "sibot",
            "hacktool",
            "february",
            "regsz",
            "english",
            "nsisinetc",
            "mozilla",
            "adobe air",
            "java",
            "http",
            "post http",
            "updater",
            "meta",
            "suspicious",
            "persistence",
            "execution",
            "referrer",
            "communicating",
            "skynet",
            "malicious",
            "gen.o",
            "dynamicloader",
            "cape",
            "enosch malware",
            "enosch",
            "music",
            "contacted",
            "pe resource",
            "resolutions",
            "siblings",
            "urls http"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
            "https://www.google.com/?authuser=0",
            "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
            "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
            "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
            "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
            "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
            "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
            "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
            "Domains Contacted: smtp.gmail.com www.google.com",
            "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
            "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
            "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
            "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Netherlands",
            "Spain",
            "Australia",
            "Korea, Republic of",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Nullsoft_NSIS",
              "display_name": "Nullsoft_NSIS",
              "target": null
            },
            {
              "id": "Win32:Agent-ASTI\\ [Trj]",
              "display_name": "Win32:Agent-ASTI\\ [Trj]",
              "target": null
            },
            {
              "id": "Worm:Win32/Enosch!atmn",
              "display_name": "Worm:Win32/Enosch!atmn",
              "target": "/malware/Worm:Win32/Enosch!atmn"
            },
            {
              "id": "Win.Trojan.Agent-357800",
              "display_name": "Win.Trojan.Agent-357800",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 1512,
            "FileHash-SHA256": 5351,
            "SSLCertFingerprint": 1,
            "URL": 1774,
            "email": 7,
            "hostname": 1170,
            "domain": 1209
          },
          "indicator_count": 13725,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9a1c71847ed3f62bca19",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T02:44:44.329000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa406d0b8009df583c87c",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-12-02T03:27:02.624000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "656457d8dfbb95a0be58b263",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656457d8dfbb95a0be58b263",
          "name": "PHI at risk? Infected Healthcare System? Masquerading",
          "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
          "modified": "2023-12-27T06:00:26.403000",
          "created": "2023-11-27T08:48:22.997000",
          "tags": [
            "windir",
            "json data",
            "getprocaddress",
            "localappdata",
            "ascii text",
            "temp",
            "unicode text",
            "indicator",
            "file",
            "pattern match",
            "path",
            "factory",
            "hybrid",
            "general",
            "detection list",
            "blacklist",
            "alexa top",
            "cisco umbrella",
            "site",
            "million",
            "safe site",
            "malware",
            "malicious site",
            "alexa",
            "phishing site",
            "malware site",
            "unsafe",
            "netsky",
            "malicious",
            "downldr",
            "raccoon",
            "redline stealer",
            "metastealer",
            "phishing",
            "cobalt strike",
            "icedid",
            "opencandy",
            "exploit",
            "riskware",
            "agent",
            "xrat",
            "download",
            "mimikatz",
            "quasar rat",
            "union",
            "team",
            "bank",
            "cve201711882",
            "vidar",
            "swrort",
            "win64",
            "suspicious",
            "deepscan",
            "trojanspy",
            "maltiverse",
            "united",
            "proxy",
            "firehol",
            "possiblecerber",
            "outlook",
            "covid19",
            "artemis",
            "generic malware",
            "tag count",
            "malware generic",
            "wed sep",
            "threat report",
            "summary",
            "sample",
            "samples",
            "first",
            "ssl certificate",
            "threat roundup",
            "whois record",
            "contacted",
            "historical ssl",
            "march",
            "referrer",
            "july",
            "historical",
            "whois whois",
            "june",
            "execution",
            "august",
            "copy",
            "april",
            "hacktool",
            "skynet",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "productidis",
            "heur",
            "anonymizer",
            "adware",
            "ransomware",
            "fuery",
            "rostpay",
            "wacatac",
            "genkryptik",
            "qakbot",
            "asyncrat",
            "installcore",
            "downloader",
            "driverpack",
            "systweak",
            "encdoc",
            "kryptik",
            "bitrep",
            "killav",
            "t",
            "noname057",
            "keylogger",
            "spyware",
            "ip summary",
            "url summary",
            "generic",
            "blacklist http",
            "malicious url",
            "iframe",
            "seraph",
            "webcompanion",
            "facebook",
            "crack",
            "xtrat",
            "cleaner",
            "azorult",
            "service",
            "runescape",
            "emotet",
            "blacknet rat",
            "stealer",
            "coinminer",
            "dropper",
            "fakealert",
            "conduit",
            "softcnapp",
            "nircmd",
            "unruy",
            "filetour",
            "patcher",
            "adload",
            "junk data",
            "random domains",
            "random hosts",
            "tsara brashears",
            "target",
            "phi",
            "uchealth",
            "content generating",
            "Web generator",
            "installcore"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
            "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://fireeyei.iowa.gov/",
            "http://michaela.young@uchealth.com/",
            "http://uchealth.com/physician/frank-avilucea/",
            "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
            "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
            "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
            "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
            "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
            "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
            "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
            "nr-data.net   (Apple Private Data Collection)",
            "uapi-qa.stlouisfed.org      (Hospital Metadata)",
            "abc7news.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "T",
              "display_name": "T",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "O.Gen",
              "display_name": "O.Gen",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "XRAT",
              "display_name": "XRAT",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 76,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 789,
            "FileHash-SHA256": 5146,
            "SSLCertFingerprint": 2,
            "domain": 1794,
            "URL": 2130,
            "hostname": 1025,
            "FileHash-MD5": 1478,
            "CVE": 15
          },
          "indicator_count": 12379,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "844 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655516871038cbad9eae2bb7",
          "name": "Apple | iOS | Automated Attacks | Resource Hijacking | Google Tracker",
          "description": "Boot or Logon Autostart Execution\nCommand and Scripting Interpreter\nAutomated Collection\nWebToolbar \nAmazon rsa\nAmazon02\nAmazon S3\nPrivilege Abuse\nRetaliation",
          "modified": "2023-12-15T18:02:25.356000",
          "created": "2023-11-15T19:05:43.285000",
          "tags": [
            "strong",
            "saal digital",
            "photo portal",
            "daten",
            "support",
            "saal",
            "bersicht",
            "informationen",
            "profis",
            "rabatte fr",
            "service",
            "heur",
            "malware",
            "cisco umbrella",
            "adware",
            "safe site",
            "malware site",
            "malicious site",
            "phishing site",
            "alexa top",
            "million",
            "tiggre",
            "presenoker",
            "agent",
            "opencandy",
            "conduit",
            "unsafe",
            "wacatac",
            "artemis",
            "phishing",
            "iframe",
            "installpack",
            "xrat",
            "fusioncore",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "genkryptik",
            "exploit",
            "filetour",
            "cleaner",
            "webtoolbar",
            "trojanspy",
            "get fdm",
            "ms windows",
            "pe32",
            "intel",
            "search",
            "show",
            "united",
            "entries",
            "systemdrive",
            "program files",
            "installer",
            "write",
            "delphi",
            "next",
            "june",
            "win32",
            "copy",
            "pixel",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "variables",
            "langpage string",
            "lang",
            "saalgroup",
            "creoletohtml",
            "chat",
            "reverse dns",
            "resource",
            "general full",
            "asn16509",
            "amazon02",
            "url https",
            "security tls",
            "protocol h2",
            "hash",
            "get h2",
            "main",
            "request chain",
            "http",
            "de redirected",
            "http redirect",
            "site",
            "malicious url",
            "blacklist https",
            "domain",
            "screenshot",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "amazons3",
            "aes128gcm",
            "amazon rsa",
            "aes256",
            "date",
            "name verdict",
            "pattern match",
            "root ca",
            "script",
            "done adding",
            "catalog file",
            "file",
            "indicator",
            "authority",
            "class",
            "mitre att",
            "meta",
            "unknown",
            "error",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "refresh",
            "tools",
            "null",
            "body",
            "create c",
            "html document",
            "xport",
            "noname057",
            "generic malware",
            "generic",
            "dapato",
            "alexa",
            "installcore",
            "downloader",
            "dropper",
            "outbreak",
            "iobit",
            "mediaget",
            "azorult",
            "runescape",
            "facebook",
            "bank",
            "download",
            "live",
            "rms",
            "maltiverse",
            "cyber threat",
            "engineering",
            "services",
            "malicious host",
            "malicious",
            "team",
            "zeus",
            "nymaim",
            "zbot",
            "simda",
            "asyncrat",
            "cobalt strike",
            "ransomware",
            "matsnu",
            "cutwail",
            "citadel",
            "pykspa",
            "raccoon",
            "kronos",
            "ramnit",
            "redline stealer",
            "apple",
            "apple",
            "html info",
            "title saal",
            "meta tags",
            "trackers google",
            "tag manager",
            "gtm5wjlq2",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "hostname",
            "anonymizer",
            "firehol",
            "mail spammer",
            "team proxy",
            "kraken",
            "suppobox",
            "tofsee",
            "vawtrak",
            "hotmail",
            "netsky",
            "stealer",
            "blacknet rat",
            "remcos",
            "miner",
            "hacktool",
            "trojan",
            "detplock",
            "team phishing",
            "a nxdomain",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "urls",
            "files",
            "ip address",
            "all search",
            "otx octoseek",
            "files ip",
            "contacted",
            "whois record",
            "ssl certificate",
            "pe resource",
            "bundled",
            "attack",
            "parent",
            "historical ssl",
            "collections",
            "communicating",
            "emotet",
            "execution",
            "markmonitor inc",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "trid win32",
            "archive",
            "valid",
            "serial number",
            "valid from",
            "valid usage",
            "code signing",
            "status status",
            "valid issuer",
            "assured id",
            "issuer issuer",
            "symantec sha256",
            "sections",
            "file type",
            "trid generic",
            "cil executable",
            "contained",
            "details module",
            "version id",
            "typelib id",
            "header target",
            "machine intel",
            "utc entry",
            "point",
            "sections name",
            "streams size",
            "entropy chi2",
            "guid",
            "blob",
            "namecheap",
            "ip detections",
            "country",
            "resolutions",
            "referrer",
            "whois whois",
            "threat roundup",
            "parent domain",
            "CVE-2023-22518",
            "CVE-2017-0143",
            "CVE-2017-0147",
            "CVE-2020-0601",
            "CVE-2017-8570",
            "CVE-2018-4893",
            "CVE-2017-11882",
            "CVE-2017-0199",
            "CVE-2014-3153",
            "W32.AIDetectNet.01",
            "trojan.adload/ursu",
            "targeting tsara brashears",
            "cybercrime",
            "privilege escalation",
            "defacement",
            "privilege abuse",
            "soc",
            "red team",
            "social engineering",
            "retaliation",
            "assault victim",
            "obsession"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
            "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
            "\u2193 Interesting \u2193",
            "owa.telegrafix.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
            "christ.robert@gmx.de",
            "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
            "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8",
            "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
            "BEELab_web_1.0.2-prerelease.exe",
            "AfraidZad.exe",
            "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
            "greycroftpartners.com",
            "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
            "trkpls3.com",
            "eg-monitoring.com",
            "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
            "https://twitter.com/PORNO_SEXYBABES"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Italy",
            "Singapore",
            "France",
            "Germany",
            "Korea, Republic of"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 841,
            "FileHash-SHA1": 467,
            "FileHash-SHA256": 6370,
            "CVE": 9,
            "domain": 2160,
            "hostname": 3074,
            "email": 1,
            "URL": 6550,
            "SSLCertFingerprint": 1,
            "CIDR": 3
          },
          "indicator_count": 19476,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65551682899b039e02b8dc8a",
          "name": "Apple | iOS | Automated Attacks | Resource Hijacking | Google Tracker",
          "description": "Boot or Logon Autostart Execution\nCommand and Scripting Interpreter\nAutomated Collection\nWebToolbar \nAmazon rsa\nAmazon02\nAmazon S3\nPrivilege Abuse\nRetaliation",
          "modified": "2023-12-15T18:02:25.356000",
          "created": "2023-11-15T19:05:38.437000",
          "tags": [
            "strong",
            "saal digital",
            "photo portal",
            "daten",
            "support",
            "saal",
            "bersicht",
            "informationen",
            "profis",
            "rabatte fr",
            "service",
            "heur",
            "malware",
            "cisco umbrella",
            "adware",
            "safe site",
            "malware site",
            "malicious site",
            "phishing site",
            "alexa top",
            "million",
            "tiggre",
            "presenoker",
            "agent",
            "opencandy",
            "conduit",
            "unsafe",
            "wacatac",
            "artemis",
            "phishing",
            "iframe",
            "installpack",
            "xrat",
            "fusioncore",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "genkryptik",
            "exploit",
            "filetour",
            "cleaner",
            "webtoolbar",
            "trojanspy",
            "get fdm",
            "ms windows",
            "pe32",
            "intel",
            "search",
            "show",
            "united",
            "entries",
            "systemdrive",
            "program files",
            "installer",
            "write",
            "delphi",
            "next",
            "june",
            "win32",
            "copy",
            "pixel",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "variables",
            "langpage string",
            "lang",
            "saalgroup",
            "creoletohtml",
            "chat",
            "reverse dns",
            "resource",
            "general full",
            "asn16509",
            "amazon02",
            "url https",
            "security tls",
            "protocol h2",
            "hash",
            "get h2",
            "main",
            "request chain",
            "http",
            "de redirected",
            "http redirect",
            "site",
            "malicious url",
            "blacklist https",
            "domain",
            "screenshot",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "amazons3",
            "aes128gcm",
            "amazon rsa",
            "aes256",
            "date",
            "name verdict",
            "pattern match",
            "root ca",
            "script",
            "done adding",
            "catalog file",
            "file",
            "indicator",
            "authority",
            "class",
            "mitre att",
            "meta",
            "unknown",
            "error",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "refresh",
            "tools",
            "null",
            "body",
            "create c",
            "html document",
            "xport",
            "noname057",
            "generic malware",
            "generic",
            "dapato",
            "alexa",
            "installcore",
            "downloader",
            "dropper",
            "outbreak",
            "iobit",
            "mediaget",
            "azorult",
            "runescape",
            "facebook",
            "bank",
            "download",
            "live",
            "rms",
            "maltiverse",
            "cyber threat",
            "engineering",
            "services",
            "malicious host",
            "malicious",
            "team",
            "zeus",
            "nymaim",
            "zbot",
            "simda",
            "asyncrat",
            "cobalt strike",
            "ransomware",
            "matsnu",
            "cutwail",
            "citadel",
            "pykspa",
            "raccoon",
            "kronos",
            "ramnit",
            "redline stealer",
            "apple",
            "apple",
            "html info",
            "title saal",
            "meta tags",
            "trackers google",
            "tag manager",
            "gtm5wjlq2",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "hostname",
            "anonymizer",
            "firehol",
            "mail spammer",
            "team proxy",
            "kraken",
            "suppobox",
            "tofsee",
            "vawtrak",
            "hotmail",
            "netsky",
            "stealer",
            "blacknet rat",
            "remcos",
            "miner",
            "hacktool",
            "trojan",
            "detplock",
            "team phishing",
            "a nxdomain",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "urls",
            "files",
            "ip address",
            "all search",
            "otx octoseek",
            "files ip",
            "contacted",
            "whois record",
            "ssl certificate",
            "pe resource",
            "bundled",
            "attack",
            "parent",
            "historical ssl",
            "collections",
            "communicating",
            "emotet",
            "execution",
            "markmonitor inc",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "trid win32",
            "archive",
            "valid",
            "serial number",
            "valid from",
            "valid usage",
            "code signing",
            "status status",
            "valid issuer",
            "assured id",
            "issuer issuer",
            "symantec sha256",
            "sections",
            "file type",
            "trid generic",
            "cil executable",
            "contained",
            "details module",
            "version id",
            "typelib id",
            "header target",
            "machine intel",
            "utc entry",
            "point",
            "sections name",
            "streams size",
            "entropy chi2",
            "guid",
            "blob",
            "namecheap",
            "ip detections",
            "country",
            "resolutions",
            "referrer",
            "whois whois",
            "threat roundup",
            "parent domain",
            "CVE-2023-22518",
            "CVE-2017-0143",
            "CVE-2017-0147",
            "CVE-2020-0601",
            "CVE-2017-8570",
            "CVE-2018-4893",
            "CVE-2017-11882",
            "CVE-2017-0199",
            "CVE-2014-3153",
            "W32.AIDetectNet.01",
            "trojan.adload/ursu",
            "targeting tsara brashears",
            "cybercrime",
            "privilege escalation",
            "defacement",
            "privilege abuse",
            "soc",
            "red team",
            "social engineering",
            "retaliation",
            "assault victim",
            "obsession"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
            "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
            "\u2193 Interesting \u2193",
            "owa.telegrafix.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
            "christ.robert@gmx.de",
            "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
            "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8",
            "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
            "BEELab_web_1.0.2-prerelease.exe",
            "AfraidZad.exe",
            "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
            "greycroftpartners.com",
            "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
            "trkpls3.com",
            "eg-monitoring.com",
            "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
            "https://twitter.com/PORNO_SEXYBABES"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Italy",
            "Singapore",
            "France",
            "Germany",
            "Korea, Republic of"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 841,
            "FileHash-SHA1": 467,
            "FileHash-SHA256": 6370,
            "CVE": 9,
            "domain": 2160,
            "hostname": 3074,
            "email": 1,
            "URL": 6550,
            "SSLCertFingerprint": 1,
            "CIDR": 3
          },
          "indicator_count": 19476,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709943cc506763d721edec",
          "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
          "description": "",
          "modified": "2023-12-06T15:54:43.175000",
          "created": "2023-12-06T15:54:43.175000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 781,
            "domain": 712,
            "URL": 4962,
            "hostname": 1795,
            "email": 4,
            "FileHash-MD5": 164,
            "FileHash-SHA1": 159
          },
          "indicator_count": 8577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a980f14b5a32303bf865b",
          "name": "CNC server.telegrafix.com",
          "description": "",
          "modified": "2023-12-02T02:35:59.820000",
          "created": "2023-12-02T02:35:59.820000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423978ca5e5c9931b586a5",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "869 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a978cf39ec3cdc99278cc",
          "name": "RedLine",
          "description": "",
          "modified": "2023-12-02T02:33:48.848000",
          "created": "2023-12-02T02:33:48.848000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423a941aa6527fbbe40a53",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "869 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545a281ce7426288033f81e",
          "name": "CNC server.telegrafix.com",
          "description": "",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-04T01:46:41.933000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423978ca5e5c9931b586a5",
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65423a941aa6527fbbe40a53",
          "name": "RedLine",
          "description": "CNC server.telegrafix.com. Brute force passwords using SSH on server RELAY\nTargeted individual, monitoring, hacking, CNC, remoted devices, tracking, malware attack,etc.\n(Auto populated: The last HTTPS certificate was signed by the US government's Department of Homeland Security (DHS), but what exactly is it and what does the certificate actually say?. and how does it look?)",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-01T11:46:28.418000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65423978ca5e5c9931b586a5",
          "name": "CNC server.telegrafix.com",
          "description": "Brute force passwords using SSH on server RELAY\nTargeted individual, adult content, malvertizing, keylogging, monitoring, hacking, CNC, remoted devices, tracking, malware attack,etc.\n(Auto populated: The last HTTPS certificate was signed by the US government's Department of Homeland Security (DHS), but what exactly is it and what does the certificate actually say?. and how does it look?)",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-01T11:41:44.861000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6430dfed2b3b3f93d5a7cc19",
          "name": ":v3 - and the rest.... - www.tiuli.com/image/a057f08d1d773ab75e116ba4fffc595f.jpg?width=1080&#039;",
          "description": "",
          "modified": "2023-05-08T02:00:47.680000",
          "created": "2023-04-08T03:30:53.195000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "optout",
            "runtime data",
            "ansi",
            "pcap processing",
            "drmedgeua",
            "pcap",
            "pcap frame",
            "optin",
            "edgeua",
            "date",
            "suspicious",
            "hybrid",
            "close",
            "click",
            "hosts",
            "april",
            "general",
            "strings",
            "qakbot",
            "united",
            "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9a478e33d2a8fa58780b09519e3f9bbbc9a32595e67b7fead10a9ad4ec17a614/6430cb9896a0a8d5f1092b9d",
            "https://hybrid-analysis.com/sample/e7d74be84c0b7bd09a96d5932c79d9579a9b2426f8ab43896a77a4b8b11d289a/6430d038f2ba281e660c5ef6",
            "http://cdn.lineate-33x.net/static/vpaid/vpaid.98dc0711.js?viewable_impression_url=https://lbs-event.gcp.lineate-33x.net/view?event=AAAAAB7wpEhwdgACAq1WS2xcVxmee8cej0dJIVkgVmjkBWrRnPF5P9pFcCPURiZpEocGsbHO0771vLgzdppUlSpL3VggFbOBLFAViU1WyCuwWHkFkUAoy7AiG5C7qbxC3oT_zkxQG7Hkyrpzzq_v_o_v_85_3Prt5dajy60bRDIplMAacyUNI0KoTSq55jKZEFnaZEQKxjVBIeGAeMQOmYAVwoxEil1yIsZNxqwvh-Px5dtFf7T5__X57X_99Xc_a7T__Y9__v1vq9-7UAXYK-I963rx9kUiTJdS0mW0S_BPyuvDB0WvZ1dFF7dfv1sMwvDeuH3jTpvgLn6rDQbJ32p_KPkb7bXRqBfvRrdeTFYFU10m26-vv3vn-g877",
            "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-%D7%91%D7%A7%D7%A2%D7%AA-%D7%91%D7%99%D7%AA-%D7%A6%D7%99%D7%93%D7%94"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4962,
            "hostname": 1795,
            "FileHash-SHA256": 781,
            "domain": 712,
            "email": 4,
            "FileHash-MD5": 164,
            "FileHash-SHA1": 159
          },
          "indicator_count": 8577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1077 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "beacons.bcp.gvt.com",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "https://search.app.goo.gl/?ofl",
        "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
        "https://thebrotherssabey.wordpress.com/",
        "greycroftpartners.com",
        "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "owa.telegrafix.com",
        "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "http://ti.hicloudcam.com",
        "FileHash-MD5\ted5c771224fbd6f9b2c0cf1e8cce09b5",
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "cpcontacts.webcamara.online",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "\u2193 Interesting \u2193",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "eg-monitoring.com",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://hybrid-analysis.com/sample/9a478e33d2a8fa58780b09519e3f9bbbc9a32595e67b7fead10a9ad4ec17a614/6430cb9896a0a8d5f1092b9d",
        "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
        "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "cobaltstrike4.tk | https://cobaltstrike4.tk:8443/include/template/isx.php",
        "blackhat.store",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "https://www.google.com/?authuser=0",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "christ.robert@gmx.de",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "abc7news.com",
        "https://hybrid-analysis.com/sample/e7d74be84c0b7bd09a96d5932c79d9579a9b2426f8ab43896a77a4b8b11d289a/6430d038f2ba281e660c5ef6",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://dreamsofspanking.com/scene/item/rosie-backlash-caning?utm_campaign=apr15",
        "https://www.tiuli.com/tracks/21/%D7%9E%D7%92-%D7%A8%D7%A1%D7%94-%D7%91%D7%A7%D7%A2%D7%AA-%D7%91%D7%99%D7%AA-%D7%A6%D7%99%D7%93%D7%94",
        "api.telegram.org",
        "http://alohatube.xyz/search/tsara-brashears",
        "trkpls3.com",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]",
        "AfraidZad.exe",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "Worm:Win32/Benjamin",
        "nr-data.net",
        "BEELab_web_1.0.2-prerelease.exe",
        "http://cdn.lineate-33x.net/static/vpaid/vpaid.98dc0711.js?viewable_impression_url=https://lbs-event.gcp.lineate-33x.net/view?event=AAAAAB7wpEhwdgACAq1WS2xcVxmee8cej0dJIVkgVmjkBWrRnPF5P9pFcCPURiZpEocGsbHO0771vLgzdppUlSpL3VggFbOBLFAViU1WyCuwWHkFkUAoy7AiG5C7qbxC3oT_zkxQG7Hkyrpzzq_v_o_v_85_3Prt5dajy60bRDIplMAacyUNI0KoTSq55jKZEFnaZEQKxjVBIeGAeMQOmYAVwoxEil1yIsZNxqwvh-Px5dtFf7T5__X57X_99Xc_a7T__Y9__v1vq9-7UAXYK-I963rx9kUiTJdS0mW0S_BPyuvDB0WvZ1dFF7dfv1sMwvDeuH3jTpvgLn6rDQbJ32p_KPkb7bXRqBfvRrdeTFYFU10m26-vv3vn-g877",
        "FileHash-SHA1\tf336b50f5cca2ddc0341e2c4001b419a830d27a5",
        "nr-data.net   (Apple Private Data Collection)",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "applemusic-spotlight.myunidays.com",
        "FileHash-SHA256\t00000254e6344d34a1e4ef157cb01d8b7efa65c22c996f9dfe85e7482c6c86ab",
        "acam-mdn.apple.com",
        "http://fireeyei.iowa.gov/",
        "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Emotet",
            "T",
            "Win32:agent-asti\\ [trj]",
            "Trojanspy",
            "Redline",
            "Qakbot - s0650",
            "Xrat",
            "Et",
            "Sabey",
            "#lowfi:siga:trojanspy:msil/keylogger",
            "Silk",
            "Worm:win32/enosch!atmn",
            "Nullsoft_nsis",
            "Driverreviver",
            "Worm:win32/benjamin",
            "Tulach",
            "Maltiverse",
            "Keylogger",
            "Rms",
            "O.gen",
            "Win.trojan.agent-357800",
            "Content reputation",
            "Generic",
            "Webtoolbar",
            "Quasar"
          ],
          "industries": [],
          "unique_indicators": 97470
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/zewangjixie888.com",
    "whois": "http://whois.domaintools.com/zewangjixie888.com",
    "domain": "zewangjixie888.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 19,
  "pulses": [
    {
      "id": "65a4885e735b9e8ba94805bc",
      "name": "Apple | Worm:Win32/Benjamin | thebrotherssabey.com",
      "description": "",
      "modified": "2024-09-05T06:51:42.608000",
      "created": "2024-01-15T01:20:30.730000",
      "tags": [
        "execution",
        "whois record",
        "contacted",
        "ssl certificate",
        "whois whois",
        "contacted urls",
        "copy",
        "historical ssl",
        "referrer",
        "urls url",
        "icmp",
        "malicious",
        "installer",
        "problems",
        "collections",
        "report",
        "phishing",
        "service tool",
        "greatness",
        "threat network",
        "emotet",
        "magniber",
        "startpage",
        "attack",
        "banker",
        "keylogger",
        "namecheap inc",
        "com laude",
        "ltd dba",
        "cloudflare",
        "porkbun llc",
        "ii llc",
        "csc corporate",
        "domains",
        "computer",
        "company limited",
        "first",
        "cloudflarenet",
        "google",
        "amazon02",
        "akamaias",
        "telecom italia",
        "utc submissions",
        "microsoftcorpas",
        "indonesia",
        "beijing gu",
        "appleaustin",
        "sucurisec",
        "amazonaes",
        "limited",
        "tsara brashears",
        "pornhub",
        "thebrotherssabey",
        "then brothers sabey",
        "brian sabey",
        "apple",
        "icloud",
        "apple engineering",
        "soc",
        "hacker",
        "teams",
        "malvertizing",
        "cyberthreat",
        "cyber crime",
        "data",
        "v3 serial",
        "number",
        "cgb stgreater",
        "ecc domain",
        "server ca",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "remote",
        "remote attacker",
        "benjamin",
        "worm",
        "trojan",
        "win32",
        "trojanspy",
        "ransomware",
        "command and control",
        "cnc",
        "c2",
        "stealer",
        "password",
        "apple unlocker",
        "pornographers",
        "cyber stalking",
        "revenge rat",
        "masquerading",
        "scanning host",
        "phishing",
        "dns",
        "network",
        "cobalt strike",
        "mitre attack",
        "metro hacker",
        "t-mobile hacker",
        "stalker",
        "social engineering",
        "et",
        "torrent trecker",
        "view",
        "duckdns",
        "blackhat",
        "data center",
        "tracking",
        "illegal",
        "malware scripting",
        "malware spreader",
        "network rat",
        "multiple botnetworks"
      ],
      "references": [
        "https://thebrotherssabey.wordpress.com/",
        "acam-mdn.apple.com",
        "beacons.bcp.gvt.com",
        "cpcontacts.webcamara.online",
        "http://dreamsofspanking.com/scene/item/rosie-backlash-caning?utm_campaign=apr15",
        "http://ti.hicloudcam.com",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://search.app.goo.gl/?ofl",
        "Worm:Win32/Benjamin",
        "FileHash-SHA256\t00000254e6344d34a1e4ef157cb01d8b7efa65c22c996f9dfe85e7482c6c86ab",
        "FileHash-MD5\ted5c771224fbd6f9b2c0cf1e8cce09b5",
        "FileHash-SHA1\tf336b50f5cca2ddc0341e2c4001b419a830d27a5",
        "applemusic-spotlight.myunidays.com",
        "nr-data.net",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4",
        "blackhat.store",
        "api.telegram.org",
        "cobaltstrike4.tk | https://cobaltstrike4.tk:8443/include/template/isx.php"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
          "display_name": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Silk",
          "display_name": "Silk",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65a429795adf468b427a3c8b",
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2469,
        "URL": 6038,
        "FileHash-MD5": 169,
        "FileHash-SHA1": 157,
        "FileHash-SHA256": 3922,
        "CIDR": 2,
        "hostname": 2787,
        "email": 2,
        "CVE": 1
      },
      "indicator_count": 15547,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "591 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a429795adf468b427a3c8b",
      "name": "Apple | Worm:Win32/Benjamin | thebrotherssabey.com",
      "description": "Retaliation. Brian Sabey representing as an attorney and many other occupations contacted and socially engineered target. Uncertain of true name. Contacted 'alleged' SA assault victim. Made claims of representing a Jeffrey Scott Reimer DPT' alleged 'S' Assaulter.  Substantiated claims made with the twist of 'victim consented'. Mark Brian Sbabeys claims dismissed. Continues to hack, harass, intimidate target in every possible way. Hacking, monitoring, service, modification, phone contact, malicious texting, in person monitoring via colleagues, hacks into medical and medical billing centers, sells/leaks targets data on dark web.    Removed targets name from most pulses via  remote device access. Self whitelist. Everything he does is illegal.\n\nTarget not important enough to law enforcement.",
      "modified": "2024-02-13T17:04:19.437000",
      "created": "2024-01-14T18:35:37.757000",
      "tags": [
        "execution",
        "whois record",
        "contacted",
        "ssl certificate",
        "whois whois",
        "contacted urls",
        "copy",
        "historical ssl",
        "referrer",
        "urls url",
        "icmp",
        "malicious",
        "installer",
        "problems",
        "collections",
        "report",
        "phishing",
        "service tool",
        "greatness",
        "threat network",
        "emotet",
        "magniber",
        "startpage",
        "attack",
        "banker",
        "keylogger",
        "namecheap inc",
        "com laude",
        "ltd dba",
        "cloudflare",
        "porkbun llc",
        "ii llc",
        "csc corporate",
        "domains",
        "computer",
        "company limited",
        "first",
        "cloudflarenet",
        "google",
        "amazon02",
        "akamaias",
        "telecom italia",
        "utc submissions",
        "microsoftcorpas",
        "indonesia",
        "beijing gu",
        "appleaustin",
        "sucurisec",
        "amazonaes",
        "limited",
        "tsara brashears",
        "pornhub",
        "thebrotherssabey",
        "then brothers sabey",
        "brian sabey",
        "apple",
        "icloud",
        "apple engineering",
        "soc",
        "hacker",
        "teams",
        "malvertizing",
        "cyberthreat",
        "cyber crime",
        "data",
        "v3 serial",
        "number",
        "cgb stgreater",
        "ecc domain",
        "server ca",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "remote",
        "remote attacker",
        "benjamin",
        "worm",
        "trojan",
        "win32",
        "trojanspy",
        "ransomware",
        "command and control",
        "cnc",
        "c2",
        "stealer",
        "password",
        "apple unlocker",
        "pornographers",
        "cyber stalking",
        "revenge rat",
        "masquerading",
        "scanning host",
        "phishing",
        "dns",
        "network",
        "cobalt strike",
        "mitre attack",
        "metro hacker",
        "t-mobile hacker",
        "stalker",
        "social engineering",
        "et",
        "torrent trecker",
        "view",
        "duckdns",
        "blackhat",
        "data center",
        "tracking",
        "illegal",
        "malware scripting",
        "malware spreader",
        "network rat",
        "multiple botnetworks"
      ],
      "references": [
        "https://thebrotherssabey.wordpress.com/",
        "acam-mdn.apple.com",
        "beacons.bcp.gvt.com",
        "cpcontacts.webcamara.online",
        "http://dreamsofspanking.com/scene/item/rosie-backlash-caning?utm_campaign=apr15",
        "http://ti.hicloudcam.com",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://search.app.goo.gl/?ofl",
        "Worm:Win32/Benjamin",
        "FileHash-SHA256\t00000254e6344d34a1e4ef157cb01d8b7efa65c22c996f9dfe85e7482c6c86ab",
        "FileHash-MD5\ted5c771224fbd6f9b2c0cf1e8cce09b5",
        "FileHash-SHA1\tf336b50f5cca2ddc0341e2c4001b419a830d27a5",
        "applemusic-spotlight.myunidays.com",
        "nr-data.net",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4",
        "blackhat.store",
        "api.telegram.org",
        "cobaltstrike4.tk | https://cobaltstrike4.tk:8443/include/template/isx.php"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
          "display_name": "#Lowfi:SIGA:TrojanSpy:MSIL/Keylogger",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Silk",
          "display_name": "Silk",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2462,
        "URL": 5950,
        "FileHash-MD5": 168,
        "FileHash-SHA1": 156,
        "FileHash-SHA256": 3901,
        "CIDR": 2,
        "hostname": 2766,
        "email": 2,
        "CVE": 1
      },
      "indicator_count": 15408,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "796 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a2f9200337f0d1fa195ada",
      "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
      "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
      "modified": "2024-02-12T20:02:49.516000",
      "created": "2024-01-13T20:57:04.197000",
      "tags": [
        "default",
        "show",
        "regsetvalueexa",
        "search",
        "regdword",
        "medium",
        "settingswpad",
        "delete",
        "ids detections",
        "yara detections",
        "worm",
        "malware",
        "copy",
        "write",
        "win32",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "graph community",
        "productidis",
        "urls",
        "mb iesettings",
        "related file",
        "cybersecurity",
        "agency",
        "csc corporate",
        "domains",
        "tucows domains",
        "nameweb bvba",
        "tucows",
        "google",
        "amazon02",
        "twitter",
        "ovh sas",
        "facebook",
        "incapsula",
        "optimizer",
        "activator",
        "kb program",
        "mb super",
        "kb acrotray",
        "1tzv",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "checks_debugger",
        "network_icmp",
        "network_smtp",
        "persistence_autorun",
        "modifies_proxy_wpad",
        "antivm_queries_computername",
        "dumped_buffer",
        "network_http",
        "antivm_network_adapters",
        "smtp_gmail",
        "attacking",
        "browser",
        "object",
        "deleted",
        "deleting",
        "deleted virustotal graphs",
        "corruption",
        "legal",
        "gvt",
        "adams co",
        "colorado",
        "law",
        "illegal practices",
        "hacking",
        "enter rexxfield",
        "roberts",
        "smith",
        "script urls",
        "as20940",
        "united",
        "a domains",
        "certificate",
        "showing",
        "entries",
        "entrust",
        "scan endpoints",
        "district",
        "as16625 akamai",
        "aaaa",
        "passive dns",
        "united kingdom",
        "whitelisted",
        "modification",
        "silence",
        "state",
        "hostname",
        "samples",
        "cover up",
        "silencing",
        "Iowa.gov",
        "dga",
        "fcc",
        "unsigned",
        "remote",
        "wiper",
        "nosy pega",
        "trojan",
        "unknown",
        "access denied",
        "servers",
        "creation date",
        "date",
        "next",
        "apple",
        "ssl certificate",
        "threat roundup",
        "march",
        "october",
        "july",
        "april",
        "whois record",
        "june",
        "roundup",
        "september",
        "august",
        "plugx",
        "goldfinder",
        "sibot",
        "hacktool",
        "february",
        "regsz",
        "english",
        "nsisinetc",
        "mozilla",
        "adobe air",
        "java",
        "http",
        "post http",
        "updater",
        "meta",
        "suspicious",
        "persistence",
        "execution",
        "referrer",
        "communicating",
        "skynet",
        "malicious",
        "gen.o",
        "dynamicloader",
        "cape",
        "enosch malware",
        "enosch",
        "music",
        "contacted",
        "pe resource",
        "resolutions",
        "siblings",
        "urls http"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.google.com/?authuser=0",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Belgium",
        "Netherlands",
        "Spain",
        "Australia",
        "Korea, Republic of",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Nullsoft_NSIS",
          "display_name": "Nullsoft_NSIS",
          "target": null
        },
        {
          "id": "Win32:Agent-ASTI\\ [Trj]",
          "display_name": "Win32:Agent-ASTI\\ [Trj]",
          "target": null
        },
        {
          "id": "Worm:Win32/Enosch!atmn",
          "display_name": "Worm:Win32/Enosch!atmn",
          "target": "/malware/Worm:Win32/Enosch!atmn"
        },
        {
          "id": "Win.Trojan.Agent-357800",
          "display_name": "Win.Trojan.Agent-357800",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2701,
        "FileHash-SHA1": 1512,
        "FileHash-SHA256": 5351,
        "SSLCertFingerprint": 1,
        "URL": 1774,
        "email": 7,
        "hostname": 1170,
        "domain": 1209
      },
      "indicator_count": 13725,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "797 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a2f9169d6996c1c928ac0b",
      "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
      "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
      "modified": "2024-02-12T20:02:49.516000",
      "created": "2024-01-13T20:56:54.333000",
      "tags": [
        "default",
        "show",
        "regsetvalueexa",
        "search",
        "regdword",
        "medium",
        "settingswpad",
        "delete",
        "ids detections",
        "yara detections",
        "worm",
        "malware",
        "copy",
        "write",
        "win32",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "graph community",
        "productidis",
        "urls",
        "mb iesettings",
        "related file",
        "cybersecurity",
        "agency",
        "csc corporate",
        "domains",
        "tucows domains",
        "nameweb bvba",
        "tucows",
        "google",
        "amazon02",
        "twitter",
        "ovh sas",
        "facebook",
        "incapsula",
        "optimizer",
        "activator",
        "kb program",
        "mb super",
        "kb acrotray",
        "1tzv",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "checks_debugger",
        "network_icmp",
        "network_smtp",
        "persistence_autorun",
        "modifies_proxy_wpad",
        "antivm_queries_computername",
        "dumped_buffer",
        "network_http",
        "antivm_network_adapters",
        "smtp_gmail",
        "attacking",
        "browser",
        "object",
        "deleted",
        "deleting",
        "deleted virustotal graphs",
        "corruption",
        "legal",
        "gvt",
        "adams co",
        "colorado",
        "law",
        "illegal practices",
        "hacking",
        "enter rexxfield",
        "roberts",
        "smith",
        "script urls",
        "as20940",
        "united",
        "a domains",
        "certificate",
        "showing",
        "entries",
        "entrust",
        "scan endpoints",
        "district",
        "as16625 akamai",
        "aaaa",
        "passive dns",
        "united kingdom",
        "whitelisted",
        "modification",
        "silence",
        "state",
        "hostname",
        "samples",
        "cover up",
        "silencing",
        "Iowa.gov",
        "dga",
        "fcc",
        "unsigned",
        "remote",
        "wiper",
        "nosy pega",
        "trojan",
        "unknown",
        "access denied",
        "servers",
        "creation date",
        "date",
        "next",
        "apple",
        "ssl certificate",
        "threat roundup",
        "march",
        "october",
        "july",
        "april",
        "whois record",
        "june",
        "roundup",
        "september",
        "august",
        "plugx",
        "goldfinder",
        "sibot",
        "hacktool",
        "february",
        "regsz",
        "english",
        "nsisinetc",
        "mozilla",
        "adobe air",
        "java",
        "http",
        "post http",
        "updater",
        "meta",
        "suspicious",
        "persistence",
        "execution",
        "referrer",
        "communicating",
        "skynet",
        "malicious",
        "gen.o",
        "dynamicloader",
        "cape",
        "enosch malware",
        "enosch",
        "music",
        "contacted",
        "pe resource",
        "resolutions",
        "siblings",
        "urls http"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.google.com/?authuser=0",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Belgium",
        "Netherlands",
        "Spain",
        "Australia",
        "Korea, Republic of",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Nullsoft_NSIS",
          "display_name": "Nullsoft_NSIS",
          "target": null
        },
        {
          "id": "Win32:Agent-ASTI\\ [Trj]",
          "display_name": "Win32:Agent-ASTI\\ [Trj]",
          "target": null
        },
        {
          "id": "Worm:Win32/Enosch!atmn",
          "display_name": "Worm:Win32/Enosch!atmn",
          "target": "/malware/Worm:Win32/Enosch!atmn"
        },
        {
          "id": "Win.Trojan.Agent-357800",
          "display_name": "Win.Trojan.Agent-357800",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2701,
        "FileHash-SHA1": 1512,
        "FileHash-SHA256": 5351,
        "SSLCertFingerprint": 1,
        "URL": 1774,
        "email": 7,
        "hostname": 1170,
        "domain": 1209
      },
      "indicator_count": 13725,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "797 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4da16bd99cc5c02528",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.406000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4d4b5e060fb8a606a8",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.403000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597f9c7542ffc6fffaecb30",
      "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
      "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:44:55.030000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9a1c71847ed3f62bca19",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T02:44:44.329000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 58,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aa406d0b8009df583c87c",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-12-02T03:27:02.624000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "656457d8dfbb95a0be58b263",
      "export_count": 60,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656457d8dfbb95a0be58b263",
      "name": "PHI at risk? Infected Healthcare System? Masquerading",
      "description": "Masquerading. Obnoxious privilege escalation. Dangerous entanglements. Attorneys representing  target, reinsurance, doctors, and alleged SA PT  'seemingly' involved with attacking & silencing Brashears. Tulach Malware present. Masquerading? Health care establishment and patient PHI at risk. Targets safety  @ risk.  Found in workers compensation (spoofed?) attorney link.\nhttp://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/  (OTX Auto populated: Researchers from the Institute for Strategic Research (MITRE) in the United States have produced a report on the threat posed to the US government by hackers using the \"fireeyei\" web address.)",
      "modified": "2023-12-27T06:00:26.403000",
      "created": "2023-11-27T08:48:22.997000",
      "tags": [
        "windir",
        "json data",
        "getprocaddress",
        "localappdata",
        "ascii text",
        "temp",
        "unicode text",
        "indicator",
        "file",
        "pattern match",
        "path",
        "factory",
        "hybrid",
        "general",
        "detection list",
        "blacklist",
        "alexa top",
        "cisco umbrella",
        "site",
        "million",
        "safe site",
        "malware",
        "malicious site",
        "alexa",
        "phishing site",
        "malware site",
        "unsafe",
        "netsky",
        "malicious",
        "downldr",
        "raccoon",
        "redline stealer",
        "metastealer",
        "phishing",
        "cobalt strike",
        "icedid",
        "opencandy",
        "exploit",
        "riskware",
        "agent",
        "xrat",
        "download",
        "mimikatz",
        "quasar rat",
        "union",
        "team",
        "bank",
        "cve201711882",
        "vidar",
        "swrort",
        "win64",
        "suspicious",
        "deepscan",
        "trojanspy",
        "maltiverse",
        "united",
        "proxy",
        "firehol",
        "possiblecerber",
        "outlook",
        "covid19",
        "artemis",
        "generic malware",
        "tag count",
        "malware generic",
        "wed sep",
        "threat report",
        "summary",
        "sample",
        "samples",
        "first",
        "ssl certificate",
        "threat roundup",
        "whois record",
        "contacted",
        "historical ssl",
        "march",
        "referrer",
        "july",
        "historical",
        "whois whois",
        "june",
        "execution",
        "august",
        "copy",
        "april",
        "hacktool",
        "skynet",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "productidis",
        "heur",
        "anonymizer",
        "adware",
        "ransomware",
        "fuery",
        "rostpay",
        "wacatac",
        "genkryptik",
        "qakbot",
        "asyncrat",
        "installcore",
        "downloader",
        "driverpack",
        "systweak",
        "encdoc",
        "kryptik",
        "bitrep",
        "killav",
        "t",
        "noname057",
        "keylogger",
        "spyware",
        "ip summary",
        "url summary",
        "generic",
        "blacklist http",
        "malicious url",
        "iframe",
        "seraph",
        "webcompanion",
        "facebook",
        "crack",
        "xtrat",
        "cleaner",
        "azorult",
        "service",
        "runescape",
        "emotet",
        "blacknet rat",
        "stealer",
        "coinminer",
        "dropper",
        "fakealert",
        "conduit",
        "softcnapp",
        "nircmd",
        "unruy",
        "filetour",
        "patcher",
        "adload",
        "junk data",
        "random domains",
        "random hosts",
        "tsara brashears",
        "target",
        "phi",
        "uchealth",
        "content generating",
        "Web generator",
        "installcore"
      ],
      "references": [
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996/65642d5cfa9d60126100612e",
        "https://www.hybrid-analysis.com/sample/8d62f650d5cb5d68441bd64ad24f088f18e34779f0c2e8178917a1e07dd65996",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://fireeyei.iowa.gov/",
        "http://michaela.young@uchealth.com/",
        "http://uchealth.com/physician/frank-avilucea/",
        "https://my.uchealth.com/myuchealth/Visits/VisitDetails?csn=WP-24%E2%80%A6FJ0JuA-3D-3D-24vasu1ISpMoMuqD8IMEos5jRZZFiBtfPMciW-2FFH52VaQ-3D",
        "http://intranet.uchealth.com/Policies/Corporate%20Policies/Standards%20of%20Performance%20and%20Conduct.pdf",
        "https://my.uchealth.com/myuchealth/inside.asp?mode=visitsummary&submode=notes&csn=WP-24PtuJGFUkCkn9owS5DdIspw-3D-3D-24g6bhGYash%E2%80%A6",
        "https://www.energyvanguard.com/blog/59284/Guest-Post-The-Fatal-Flaw-in-Advanced-Framing-Part-1",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=",
        "https://www.wlafx4trk.com/cmp/33K48/5ZK2T/?source_id=95_1236_91dabe93-2a51-4b93-bfd3-4a4bd7e00ff3_31&sub1=4df5b890c55d4bdead5ba03dde982afa",
        "https://yugemobile.com/tracking?plcmntid=ym5002&imps=2dda8436-396e-4b37-a917-0cce11ffb623",
        "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net      (b.link infringement)",
        "nr-data.net   (Apple Private Data Collection)",
        "uapi-qa.stlouisfed.org      (Hospital Metadata)",
        "abc7news.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "T",
          "display_name": "T",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "O.Gen",
          "display_name": "O.Gen",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Quasar",
          "display_name": "Quasar",
          "target": null
        },
        {
          "id": "QakBot - S0650",
          "display_name": "QakBot - S0650",
          "target": null
        },
        {
          "id": "XRAT",
          "display_name": "XRAT",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1588.004",
          "name": "Digital Certificates",
          "display_name": "T1588.004 - Digital Certificates"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 76,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 789,
        "FileHash-SHA256": 5146,
        "SSLCertFingerprint": 2,
        "domain": 1794,
        "URL": 2130,
        "hostname": 1025,
        "FileHash-MD5": 1478,
        "CVE": 15
      },
      "indicator_count": 12379,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "844 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://zewangjixie888.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://zewangjixie888.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642112.0679147
}