{
  "type": "Domain",
  "indicator": "jquery.data",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/jquery.data",
    "alexa": "http://www.alexa.com/siteinfo/jquery.data",
    "indicator": "jquery.data",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2272174271,
      "indicator": "jquery.data",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 17,
      "pulses": [
        {
          "id": "65eea19a23474b8c7dca351f",
          "name": "All Items - find from the UA archive disk",
          "description": "Again have zero idea 'what these are' - just uploading from the 'archives' as I sort through things",
          "modified": "2025-12-24T08:28:47.628000",
          "created": "2024-03-11T06:15:54.351000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "116 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "553 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "664bd9b732ecaf1b3c3beddf",
          "name": "Found some problems - Files from the UAlberta Google Drive Archive",
          "description": "Been looking for these...Gifts from the University of Alberta to the World apparently\n*Please note: I emptied out the Drive, however, there was a significant amount of abuse re: Google and Microsoft Accounts at the University of Alberta (reported).\n*On the Google side I utilized: Drive (a little), Docs/Slides/Sheets (when groupwork was required)\n*On the Microsoft side I utilized: OneDrive, Office 365 (Word, PPT, Excel, and OneNote). I used to also have a personal microsoft account (OneNote, OneDrive, Skype).\nThese were the applications I lived on for my studies. I could access the Gmail/Microsoft accounts for the University (however - 'bad things' usually happen because of this). I have no access to my personal Microsoft Account (i.e. myself and other affected student(s) do not have access to our personal stuff.",
          "modified": "2024-09-03T00:02:13.980000",
          "created": "2024-05-20T23:16:07.255000",
          "tags": [
            "contact",
            "quick",
            "destination",
            "entry",
            "safety",
            "local",
            "health",
            "travel",
            "notification",
            "considerations",
            "service",
            "criminal",
            "showit",
            "click",
            "outcome",
            "step",
            "please",
            "class",
            "questions set",
            "question set",
            "unlock",
            "continue",
            "jointfilingyes",
            "jointfilingno",
            "minimum req",
            "domicileresusno",
            "joint sponsor",
            "sponsorjoint",
            "path",
            "href",
            "span",
            "activetab",
            "starton",
            "newpage",
            "searchq",
            "datasia",
            "datacon",
            "segfilter",
            "subsite",
            "issuance agency",
            "visas",
            "null",
            "state",
            "dialog field",
            "tabpanel",
            "recaptcha",
            "nameinputvisa",
            "fullnameinput1",
            "license headers",
            "tools",
            "templates",
            "sia contact",
            "visa",
            "website",
            "phoneregexp",
            "emailregexp",
            "azaz",
            "urlpattern",
            "example starter",
            "javascript",
            "fetch",
            "comptwo",
            "compone",
            "dateofbirth",
            "function",
            "date",
            "passport",
            "nameinput",
            "fullnameinput",
            "adult passport",
            "child passport",
            "new child",
            "new adult",
            "new passport",
            "datepicker",
            "ds5504",
            "hideit",
            "infinity",
            "false",
            "jquery",
            "error",
            "body",
            "trident",
            "simple",
            "turn",
            "back",
            "calendar",
            "format",
            "february",
            "april",
            "june",
            "august",
            "show",
            "page has",
            "bcdate",
            "col1child",
            "col2child",
            "coldatechild",
            "rowdisplay",
            "val1",
            "val2",
            "repaginate",
            "grab",
            "jandec",
            "86400000",
            "current",
            "namerbcontactme",
            "agency",
            "compliment",
            "complaint",
            "passportfees",
            "customerservice",
            "bymail",
            "namerbcategory",
            "brokenlink",
            "search",
            "departuredate",
            "calendar date",
            "picker",
            "change",
            "month",
            "vital",
            "records form",
            "component js",
            "select",
            "please enter",
            "azaz09",
            "dddddd",
            "woff2",
            "woff",
            "truetype",
            "css document",
            "efefef",
            "ffffff",
            "gradienttype0",
            "galaxy",
            "nexus",
            "iphone5",
            "abtn",
            "bbtn",
            "cbtn",
            "dbtn",
            "ebtn",
            "fbtn",
            "gbtn",
            "hbtn",
            "ibtn",
            "media query",
            "from",
            "fce68e",
            "font family",
            "bold",
            "document",
            "cc3333",
            "b7b7b7",
            "e2edff",
            "ced9ea",
            "pm author",
            "ipca csi",
            "helvetica",
            "arial",
            "cq aem",
            "feed classes",
            "f2cd54",
            "f4d97e",
            "portrait",
            "landscape",
            "ipad",
            "declare",
            "immigrant",
            "visa navigation",
            "navigation css",
            "georgia",
            "times new",
            "roman",
            "times",
            "verdana",
            "photomodal",
            "styles media",
            "ff0000",
            "queries",
            "form component",
            "typetext",
            "queries media",
            "phone media",
            "tablet styles",
            "media queries",
            "jumbo sized",
            "copyright",
            "gpl version",
            "http",
            "alpha",
            "button",
            "out width",
            "ui css",
            "framework",
            "icons",
            "misc",
            "mini",
            "input",
            "label",
            "textarea",
            "overlays",
            "csi page",
            "embassy info",
            "embassy data",
            "embassy names",
            "end adjust",
            "embassy nameso",
            "pages",
            "e1a04d",
            "c0c0c0",
            "ffffff url",
            "us survey",
            "component css",
            "country list",
            "e7eceb",
            "important",
            "additional css",
            "wizard",
            "corner radius",
            "f97800",
            "c61700",
            "largestbox",
            "thisbox",
            "csi navigation",
            "ui autocomplete",
            "ui menu",
            "noticeid",
            "countnote",
            "largestnote",
            "thisnote",
            "desktops",
            "43px",
            "42px",
            "large",
            "aem interface",
            "styles",
            "web email",
            "ytconfig",
            "typeerror",
            "facebook pixel",
            "pixel code",
            "symbol",
            "fblog",
            "typeof",
            "iterator",
            "pageview",
            "pixel",
            "facebook",
            "config",
            "meta",
            "propname",
            "dpjquerydpuuid",
            "this",
            "next",
            "atom",
            "cookie",
            "iframe",
            "close",
            "string",
            "number",
            "edge",
            "regexp",
            "silk",
            "sxa0",
            "object",
            "opera",
            "android",
            "void",
            "form",
            "UAlberta",
            "Android",
            "Mac",
            "iPhone",
            "Gov Alberta",
            "AWS",
            "AZURE",
            "ENTRA",
            "iCloud",
            "Telus",
            "Bitdefender",
            "Norton"
          ],
          "references": [
            "Copy of clientlib.js(1).download",
            "Copy of clientlib.js(2).download",
            "Copy of clientlib.js(5).download",
            "Copy of clientlib.js(7).download",
            "Copy of clientlib.js(4).download",
            "Copy of clientlib.js(10).download",
            "Copy of clientlib.js(8).download",
            "Copy of clientlib.js(11).download",
            "Copy of clientlib.js(12).download",
            "Copy of clientlib.js(13).download",
            "Copy of clientlib.js(14).download",
            "Copy of clientlib.js(9).download",
            "Copy of clientlib.js(16).download",
            "Copy of clientlib.js(17).download",
            "Copy of clientlib.js(18).download",
            "Copy of clientlib.js(3).download",
            "Copy of clientlib.js(19).download",
            "Copy of clientlib.js(15).download",
            "Copy of clientlib.js(22).download",
            "Copy of clientlib.js(23).download",
            "Copy of clientlib.js(21).download",
            "Copy of clientlib.js(26).download",
            "Copy of clientlib.js(25).download",
            "Copy of clientlib.js(24).download",
            "Copy of clientlib.js(31).download",
            "Copy of clientlib.js(28).download",
            "Copy of clientlib.js(30).download",
            "Copy of clientlib.js(32).download",
            "Copy of clientlib.js(29).download",
            "Copy of clientlib.js(34).download",
            "Copy of clientlib.js(35).download",
            "Copy of clientlib.js(37).download",
            "Copy of clientlib.js(36).download",
            "Copy of clientlib.js(38).download",
            "Copy of clientlib.js(39).download",
            "Copy of clientlib.js(33).download",
            "Copy of clientlib.js(44).download",
            "Copy of clientlib.js(43).download",
            "Copy of clientlib.js(41).download",
            "Copy of clientlib.js(42).download",
            "Copy of clientlib.js(45).download",
            "Copy of clientlib.js(51).download",
            "Copy of clientlib.js(56).download",
            "Copy of clientlib.js(55).download",
            "Copy of clientlib.js(54).download",
            "Copy of clientlib.js(57).download",
            "Copy of clientlib.js(52).download",
            "Copy of clientlib.js(53).download",
            "Copy of clientlib.js(60).download",
            "Copy of clientlib(1).css",
            "Copy of clientlib.js(59).download",
            "Copy of clientlib(3).css",
            "Copy of clientlib(2).css",
            "Copy of clientlib(5).css",
            "Copy of clientlib.js(58).download",
            "Copy of clientlib(8).css",
            "Copy of clientlib(10).css",
            "Copy of clientlib(7).css",
            "Copy of clientlib(6).css",
            "Copy of clientlib(12).css",
            "Copy of clientlib(13).css",
            "Copy of clientlib(9).css",
            "Copy of clientlib(4).css",
            "Copy of clientlib(14).css",
            "Copy of clientlib(17).css",
            "Copy of clientlib(15).css",
            "Copy of clientlib(19).css",
            "Copy of clientlib(18).css",
            "Copy of clientlib(11).css",
            "Copy of clientlib(20).css",
            "Copy of clientlib(16).css",
            "Copy of clientlib(23).css",
            "Copy of clientlib(24).css",
            "Copy of clientlib(26).css",
            "Copy of clientlib(25).css",
            "Copy of clientlib(28).css",
            "Copy of clientlib(22).css",
            "Copy of clientlib(27).css",
            "Copy of clientlib(31).css",
            "Copy of clientlib(29).css",
            "Copy of clientlib(30).css",
            "Copy of clientlib(32).css",
            "Copy of clientlib(34).css",
            "Copy of clientlib(35).css",
            "Copy of clientlib(33).css",
            "Copy of clientlib(38).css",
            "Copy of clientlib(37).css",
            "Copy of clientlib(36).css",
            "Copy of clientlib(40).css",
            "Copy of clientlib(39).css",
            "Copy of clientlib(43).css",
            "Copy of clientlib(21).css",
            "Copy of clientlib(41).css",
            "Copy of clientlib(44).css",
            "Copy of clientlib(42).css",
            "Copy of clientlib(46).css",
            "Copy of clientlib(45).css",
            "Copy of clientlib(47).css",
            "Copy of clientlib(48).css",
            "Copy of clientlib(49).css",
            "Copy of clientlib(50).css",
            "Copy of clientlib(52).css",
            "Copy of clientlib(54).css",
            "Copy of clientlibs.js(3).download",
            "Copy of clientlib(53).css",
            "Copy of clientlibs.js(2).download",
            "Copy of clientlibs(3).css",
            "Copy of clientlib(51).css",
            "Copy of clientlibs(1).css",
            "Copy of clientlibs(2).css",
            "Copy of clientlibs.js.download",
            "Copy of clientlibs.js(4).download",
            "Copy of clientlibs(5).css",
            "Copy of clientlibs.css",
            "Copy of clientlibs(4).css",
            "Copy of dir (1).c9r",
            "Copy of clientlib(55).css",
            "Copy of iframe_api",
            "Copy of fbevents.js.download",
            "Copy of clientlibs.js(1).download",
            "Copy of js",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
            "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
            "hxxps://portal[.]office[.]com/Account",
            "hxxps://myapplications[.]microsoft[.]com/",
            "https://tria.ge/240521-rvybaahb79",
            "https://tria.ge/240521-rxpf6ahd6w",
            "https://tria.ge/240521-r1yh8shd44",
            "https://tria.ge/240521-ry949ahe2z/behavioral1",
            "https://tria.ge/240521-r3mvhshd83"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Mexico",
            "Anguilla",
            "Aruba",
            "Panama",
            "Ukraine",
            "Trinidad and Tobago",
            "Saint Vincent and the Grenadines",
            "Saint Martin (French part)",
            "Sint Maarten (Dutch part)",
            "Philippines",
            "Netherlands",
            "Cura\u00e7ao",
            "Georgia",
            "Tanzania, United Republic of",
            "Costa Rica",
            "Guatemala",
            "Japan",
            "Barbados"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            }
          ],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Healthcare",
            "Biotechnology",
            "Telecommunications",
            "Energy",
            "Construction",
            "Chemical",
            "Agriculture",
            "Finance",
            "Media",
            "Defense",
            "Transportation"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 251,
            "hostname": 188,
            "FileHash-SHA256": 142,
            "URL": 69,
            "FileHash-MD5": 77,
            "FileHash-SHA1": 77
          },
          "indicator_count": 804,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 133,
          "modified_text": "594 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6639853fc403f7be5bd6f27d",
          "name": "Facebook+",
          "description": "",
          "modified": "2024-05-07T01:34:55.365000",
          "created": "2024-05-07T01:34:55.365000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65eea19a23474b8c7dca351f",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Phone2209",
            "id": "281168",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1,
          "modified_text": "713 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "657096b22a51f1cc56dcfb53",
          "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
          "description": "",
          "modified": "2023-12-06T15:43:46.083000",
          "created": "2023-12-06T15:43:46.083000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 802,
            "hostname": 392,
            "domain": 134,
            "FileHash-SHA256": 82,
            "FileHash-MD5": 1
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e456bdbf8ea8d0d504a",
          "name": "whitehouse.gov",
          "description": "",
          "modified": "2023-12-06T15:07:49.577000",
          "created": "2023-12-06T15:07:49.577000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 449,
            "hostname": 639,
            "domain": 245,
            "URL": 1609,
            "FileHash-MD5": 4
          },
          "indicator_count": 2946,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f8475d8a8785dfc5a2f",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2023-12-06T14:04:52.250000",
          "created": "2023-12-06T14:04:52.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "hostname": 833,
            "domain": 441,
            "URL": 2375,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f7f79257c3b4f276f35",
          "name": "whitehouse.govapi_2.27.22",
          "description": "",
          "modified": "2023-12-06T14:04:47.874000",
          "created": "2023-12-06T14:04:47.874000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 489,
            "hostname": 405,
            "domain": 306,
            "URL": 1451,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2656,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "63dbbf6ae4f5433c2bab52e9",
          "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
          "description": "A guide to some of the key methods used by the web browser, jQuery, to create web pages and add links to the search engine and other parts of its web address system, as well as the address bar.",
          "modified": "2023-03-04T13:00:43.098000",
          "created": "2023-02-02T13:49:30.620000",
          "tags": [
            "null",
            "copyright",
            "jan sorgalla",
            "built",
            "bill scott",
            "http",
            "error",
            "function",
            "title",
            "method",
            "play",
            "fast",
            "click",
            "return",
            "href",
            "target",
            "span",
            "pass",
            "linear",
            "timebuff",
            "block",
            "trigger",
            "nivoslider",
            "display",
            "width",
            "show",
            "next",
            "arrow",
            "restart",
            "stop",
            "iframe",
            "alpha",
            "factory",
            "type",
            "handle",
            "sizzle",
            "match",
            "check",
            "make sure",
            "elem",
            "name",
            "regexp",
            "hooks",
            "false",
            "date",
            "class",
            "internal",
            "done",
            "bind",
            "test",
            "body",
            "copy",
            "hold",
            "mozilla",
            "logic",
            "flash",
            "jquery",
            "fall",
            "bubble",
            "prop",
            "meta",
            "middle",
            "mark",
            "thus",
            "form",
            "script script",
            "a li",
            "div div",
            "mua bn",
            "link",
            "a div",
            "trang ch",
            "gii thiu",
            "tin tc",
            "header http2",
            "gmt cache",
            "gmt server",
            "litespeed",
            "443 ma2592000",
            "172.217.16.232",
            "http://lhr48s28-in-f8.1e100.net"
          ],
          "references": [
            "[object Object] is a string representation of an object instance. Take this example: When the alert runs, it returns [object Object] in the alert modal. It tries to return a string representation of what was passed into alert, but because the engine sees this as an object, and not a string, it tells us that its an instance of an Object instead.",
            "443 Header\tHTTP/2 200 x powered by: PHP/7.4.29 set cookie: PHPSESSID=9158e16820bdbb5be0d1faa520b7dc19 path=/ expires: Thu 19 Nov 1981 08:52:00 GMT cache control: no store no cache must revalidate pragma: no cache content type: text/html charset=UTF 8 date: Thu 02 Feb 2023 13:37:37 GMT server: LiteSpeed alt svc: quic= :443 ma=2592000 v= 35 39 43 44",
            "whitelists are really not the way forward unless you validate the integrity often Speedtest are also being screwed with ie allowing your neural controlled network out on a temp basis to prevent you from ousting the APT controlling your home broadband / wifi network",
            "xml version= 1.0 encoding= utf 8 DOCTYPE html PUBLIC //WAPFORUM//DTD XHTML Mobile 1.0//EN http://www.wapforum.org/DTD/xhtml mobile10.dtd html xmlns= http://www.w3.org/1999/xhtml head meta http equiv= Content Type content= text/html charset=utf 8 / title mua bn nh t cho thu nh t sang nhng sang nhng ca hng /title meta name= copyright content= 2010 2020 bds247.vn / meta name= google site verification content= suyiBYZARDnZ4zGeoAiF VajqMQ0pgLGnEm69aZ aIY / meta name= robots content= index follow / meta name= key",
            "https://m.bds247.vn//view/js/jquery6_1.js 443",
            "https://www.googletagmanager.com/gtag/js?id=G-56M7ZWVN9L",
            "https://m.bds247.vn/lib/nivo-slider/slider.js 443 Script",
            "https://m.bds247.vn/view/js/page.js 443 Script",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js 443 Script",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.pikachoose.js",
            "This is the full text of the XHTML mobile10.dtd.xml, which is based on the code created by the developers of Google's search engine, iPlayer and other sites.",
            "https://m.bds247.vn//view/js/jquery6_1.js",
            "https://m.bds247.vn/lib/nivo-slider/slider.js",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 802,
            "hostname": 392,
            "FileHash-SHA256": 82,
            "domain": 134,
            "FileHash-MD5": 1
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1142 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6281b34e4324a6b2fbc00d58",
          "name": "whitehouse.gov",
          "description": "",
          "modified": "2022-06-14T00:00:05.659000",
          "created": "2022-05-16T02:13:34.527000",
          "tags": [],
          "references": [
            "whitehouse.gov 2.27.22 6.pdf",
            "whitehouse.gov 2.28.22 8.pdf",
            "whitehouse.gov 2.27.22 3.pdf",
            "whitehouse.gov 2.27.22 2.pdf",
            "whithouse.gov 2.27.22 4.pdf",
            "whitehouse.gov 2.27.22 8.pdf",
            "whitehouse.govapi_2.27.22.pdf",
            "whitehouse.gov 2.27.22 7.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 639,
            "URL": 1610,
            "FileHash-SHA256": 449,
            "domain": 245,
            "FileHash-MD5": 4
          },
          "indicator_count": 2947,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62750795ebc8c475f4a3033a",
          "name": "aquanx.com (PegTech botnet hosting)",
          "description": "var b[f, g.g, is a new addition to the list of characters that can be added to a singleElement, as well as a set of numbers, if they are new.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T11:33:41.174000",
          "tags": [
            "function",
            "eu cookie",
            "version",
            "tamas schalk",
            "element",
            "lang",
            "datadelay",
            "dataexpire",
            "dataclass",
            "name",
            "date",
            "path",
            "null",
            "cookie",
            "regexp",
            "typeof e",
            "please",
            "typeof t",
            "pseudo",
            "child",
            "array",
            "error",
            "class",
            "void",
            "this",
            "extendedvps",
            "login register",
            "product group",
            "svssdlinux",
            "svssdwindows",
            "password",
            "client area",
            "aquanx english",
            "azerbaijani",
            "catal",
            "colocation\uff0ccustomized service\uff0cone-stop service\uff0caffordable cloud ",
            "aquanx",
            "metal cloud",
            "chat",
            "ddos migration",
            "network",
            "colocation",
            "cloud",
            "colocation bare",
            "cloud hosting",
            "private cloud",
            "bare",
            "service",
            "custom build",
            "https",
            "bootstrap",
            "bootstrap hover",
            "dropdown",
            "author",
            "cameron spear",
            "mattia larentis",
            "dropdown plugin",
            "http",
            "plugin",
            "copyright",
            "twitter",
            "conflict",
            "focus",
            "object",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "false",
            "type",
            "expando",
            "typeof selector",
            "sizzle",
            "elem",
            "match",
            "data",
            "seed",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "quota",
            "aafunction",
            "dafunction"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
            "https://aquanx.com/js/jquery-1.12.4.min.js",
            "https://aquanx.com/js/bootstrap.js",
            "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
            "https://aquanx.com/js/modernizr-custom.js",
            "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
            "https://aquanx.com/",
            "https://user.aquanx.com/clientarea.php",
            "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
            "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
            "xfe-URL-raksmart.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "URL": 1236,
            "domain": 184,
            "FileHash-SHA256": 79
          },
          "indicator_count": 2059,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "626b070ed44bcc9ad7b76bab",
          "name": "PSI Software AG - Software f\u00fcr Energieversorger, Industrieunternehmen und Infrastrukturbetreiber",
          "description": "PSI Software AG (PSI) is best known for its smart city software, which is also its Smart City software and a range of other product-enhancing technologies, such as smart cities.",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T21:28:46.014000",
          "tags": [
            "span",
            "tbody",
            "tfoot",
            "thead",
            "fontawesome",
            "multiple",
            "woff",
            "truetype",
            "type",
            "href",
            "alpha",
            "twitter",
            "false",
            "parsley",
            "error",
            "typeof t",
            "fieldmultiple",
            "function",
            "regexp",
            "select",
            "typeof",
            "validator",
            "typeof n",
            "form",
            "datavalidation",
            "user",
            "return",
            "body",
            "cursor",
            "validate",
            "checkbox",
            "write",
            "selectedindex",
            "date",
            "true",
            "value",
            "index",
            "null",
            "name",
            "prop",
            "class",
            "hooks",
            "this",
            "jquery",
            "open",
            "scroll",
            "click",
            "seed",
            "target",
            "code",
            "accept",
            "local",
            "speed",
            "back",
            "bounce",
            "february",
            "april",
            "june",
            "august",
            "next",
            "string",
            "number",
            "trackevent",
            "copyright",
            "path",
            "host",
            "uint8array",
            "xhfunction",
            "download",
            "void",
            "softwarel\u00f6sungen",
            "prozesssteuerung",
            "leitsystem",
            "branchensoftware",
            "erp",
            "mes",
            "pps",
            "netzleittechnik",
            "fertigungsleitsystem",
            "automatisierung",
            "psi software",
            "psi blog",
            "toggle dropdown",
            "aktienrckkauf",
            "news",
            "umsatzwachstum",
            "formwechsel",
            "software",
            "versorger und",
            "english deutsch",
            "green",
            "messen"
          ],
          "references": [
            "xfe-URL-Psi.de-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NF2ZT3",
            "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-e2b75d5cfe54ba9b7d678cb1c848421f.merged.js",
            "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-bd4b8119586687574cf8f8529359d678.merged.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "selectedIndex",
              "display_name": "selectedIndex",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 232,
            "URL": 425,
            "FileHash-SHA256": 157,
            "domain": 225,
            "FileHash-MD5": 4
          },
          "indicator_count": 1043,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1423 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "626b06ae6171c5d04f1bab38",
          "name": "PSI Software AG - Software f\u00fcr Energieversorger, Industrieunternehmen und Infrastrukturbetreiber",
          "description": "PSI Software AG (PSI) is best known for its smart city software, which is also its Smart City software and a range of other product-enhancing technologies, such as smart cities.",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T21:27:10.738000",
          "tags": [
            "span",
            "tbody",
            "tfoot",
            "thead",
            "fontawesome",
            "multiple",
            "woff",
            "truetype",
            "type",
            "href",
            "alpha",
            "twitter",
            "false",
            "parsley",
            "error",
            "typeof t",
            "fieldmultiple",
            "function",
            "regexp",
            "select",
            "typeof",
            "validator",
            "typeof n",
            "form",
            "datavalidation",
            "user",
            "return",
            "body",
            "cursor",
            "validate",
            "checkbox",
            "write",
            "selectedindex",
            "date",
            "true",
            "value",
            "index",
            "null",
            "name",
            "prop",
            "class",
            "hooks",
            "this",
            "jquery",
            "open",
            "scroll",
            "click",
            "seed",
            "target",
            "code",
            "accept",
            "local",
            "speed",
            "back",
            "bounce",
            "february",
            "april",
            "june",
            "august",
            "next",
            "string",
            "number",
            "trackevent",
            "copyright",
            "path",
            "host",
            "uint8array",
            "xhfunction",
            "download",
            "void",
            "softwarel\u00f6sungen",
            "prozesssteuerung",
            "leitsystem",
            "branchensoftware",
            "erp",
            "mes",
            "pps",
            "netzleittechnik",
            "fertigungsleitsystem",
            "automatisierung",
            "psi software",
            "psi blog",
            "toggle dropdown",
            "aktienrckkauf",
            "news",
            "umsatzwachstum",
            "formwechsel",
            "software",
            "versorger und",
            "english deutsch",
            "green",
            "messen"
          ],
          "references": [
            "xfe-URL-Psi.de-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NF2ZT3",
            "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-e2b75d5cfe54ba9b7d678cb1c848421f.merged.js",
            "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-bd4b8119586687574cf8f8529359d678.merged.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "selectedIndex",
              "display_name": "selectedIndex",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 232,
            "URL": 425,
            "FileHash-SHA256": 157,
            "domain": 225,
            "FileHash-MD5": 4
          },
          "indicator_count": 1043,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1423 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "624ade33b2dd93cdc7ef4b58",
          "name": "Botnet c&c",
          "description": "ParallelAxisIndex:0,label:1,lineStyle:2,inactiveOpacity: 1.05,m.g,graphicKey: m.style,t.",
          "modified": "2022-04-04T12:01:54.999000",
          "created": "2022-04-04T12:01:54.999000",
          "tags": [
            "datav6a0cc948",
            "pingfang sc",
            "microsoft yahei",
            "helvetica neue",
            "helvetica",
            "hiragino sans",
            "arial",
            "datav11c9d7e6",
            "datava3f4887a",
            "datav12834d8c",
            "span",
            "open",
            "date",
            "function",
            "typeof t",
            "regexp",
            "number",
            "typeof e",
            "null",
            "width",
            "typeof s",
            "error",
            "this",
            "class",
            "accept",
            "d mmmm",
            "yyyy",
            "yyyy hh",
            "llll",
            "pjh5",
            "dddd",
            "ds5p",
            "void",
            "android",
            "backspace",
            "typeof define",
            "load",
            "mika tuupola",
            "boolean"
          ],
          "references": [
            "https://cdf5cxngkkxd.com/#/home",
            "https://cdf5cxngkkxd.com/static/js/lazyload.min.js",
            "https://cdf5cxngkkxd.com/static/js/manifest.e4d52d2f9dae6cd41eb4.js",
            "https://cdf5cxngkkxd.com/static/js/vendor.084bf9e0e16f0b2b6faa.js",
            "https://cdf5cxngkkxd.com/static/js/app.e16f8acb87917d3eab20.js",
            "https://cdf5cxngkkxd.com/static/css/app.7b16cc13d7ec8824766fa8255c64a800.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 334,
            "URL": 1182,
            "domain": 214,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc13f579cdd25d609b309",
          "name": "whitehouse.govapi_2.27.22",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:21:51.099000",
          "tags": [
            "show",
            "download go",
            "full url",
            "reverse dns",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "main",
            "accept",
            "february",
            "behaviour",
            "lookup go",
            "rescan add",
            "verdict report",
            "de summary",
            "http",
            "redirects links",
            "similar dom",
            "content api",
            "value",
            "search domain",
            "scan url",
            "search url",
            "meta",
            "detected",
            "akamaiasn1",
            "google",
            "expand overall",
            "page url",
            "iframe"
          ],
          "references": [
            "whitehouse.govapi_2.27.22.pdf",
            "whithouse.gov 2.27.22 4.pdf",
            "whitehouse.gov 2.27.22 2.pdf",
            "whitehouse.gov 2.27.22 1.pdf",
            "whitehouse.gov 2.27.22 6.pdf",
            "whitehouse.gov 2.27.22 3.pdf",
            "whitehouse.gov 2.27.22 5.pdf",
            "whitehouse.gov 2.28.22 8.pdf",
            "whitehouse.gov 2.27.22 7.pdf",
            "whitehouse.gov 2.27.22 8.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1452,
            "hostname": 405,
            "domain": 306,
            "FileHash-SHA256": 489,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1483 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc3aa050a6c5693595f25",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:32:10.542000",
          "tags": [
            "google",
            "google llc",
            "detected",
            "expand overall",
            "http",
            "amazonaes",
            "openssl",
            "lookup go",
            "rescan add",
            "verdict report",
            "behaviour",
            "june",
            "apache",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "us summary",
            "line",
            "google maps",
            "api warning",
            "redirects links",
            "similar dom",
            "content api",
            "domains",
            "Ransomware"
          ],
          "references": [
            "zetalytics .pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot.G",
              "display_name": "Trojan:Win32/Danabot.G",
              "target": "/malware/Trojan:Win32/Danabot.G"
            },
            {
              "id": "Backdoor:Win32/Poison.E",
              "display_name": "Backdoor:Win32/Poison.E",
              "target": "/malware/Backdoor:Win32/Poison.E"
            },
            {
              "id": "ALF:PUA:Block:IObit.R!MTB",
              "display_name": "ALF:PUA:Block:IObit.R!MTB",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "URL": 2375,
            "domain": 441,
            "hostname": 833,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1483 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "Copy of js",
        "Copy of clientlib(26).css",
        "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
        "https://tria.ge/240521-rvybaahb79",
        "https://cdf5cxngkkxd.com/#/home",
        "Copy of clientlib.js(26).download",
        "Copy of clientlib.js(13).download",
        "whitehouse.gov 2.27.22 7.pdf",
        "https://aquanx.com/js/jquery-1.12.4.min.js",
        "https://tria.ge/240521-r3mvhshd83",
        "Copy of clientlib.js(14).download",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.pikachoose.js",
        "Copy of clientlib(4).css",
        "Copy of clientlib(55).css",
        "Copy of clientlib.js(12).download",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
        "Copy of clientlib(40).css",
        "Copy of clientlib.js(11).download",
        "Copy of clientlib(24).css",
        "Copy of clientlib(41).css",
        "https://cdf5cxngkkxd.com/static/js/app.e16f8acb87917d3eab20.js",
        "https://cdf5cxngkkxd.com/static/css/app.7b16cc13d7ec8824766fa8255c64a800.css",
        "Copy of clientlib.js(35).download",
        "Copy of clientlib(5).css",
        "zetalytics .pdf",
        "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs",
        "Copy of clientlib(29).css",
        "Copy of clientlib.js(59).download",
        "Copy of clientlib(8).css",
        "Copy of clientlib.js(15).download",
        "Copy of clientlib(47).css",
        "Copy of clientlibs.css",
        "Copy of clientlib.js(54).download",
        "Copy of clientlibs(5).css",
        "Copy of iframe_api",
        "https://aquanx.com/js/modernizr-custom.js",
        "https://cdf5cxngkkxd.com/static/js/lazyload.min.js",
        "Copy of clientlib(42).css",
        "Copy of clientlibs(1).css",
        "Copy of clientlib(30).css",
        "Copy of clientlib.js(3).download",
        "Copy of clientlib(37).css",
        "Copy of clientlib(22).css",
        "Copy of clientlib.js(44).download",
        "Copy of clientlib(34).css",
        "Copy of clientlib(31).css",
        "Copy of fbevents.js.download",
        "Copy of clientlib.js(21).download",
        "Copy of clientlib.js(7).download",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "Copy of clientlib.js(10).download",
        "https://user.aquanx.com/clientarea.php",
        "Copy of dir (1).c9r",
        "Copy of clientlibs.js(3).download",
        "hxxps://portal[.]office[.]com/Account",
        "Copy of clientlib.js(9).download",
        "Copy of clientlib(44).css",
        "https://m.bds247.vn/lib/nivo-slider/slider.js 443 Script",
        "Copy of clientlib.js(45).download",
        "Copy of clientlib.js(22).download",
        "This is the full text of the XHTML mobile10.dtd.xml, which is based on the code created by the developers of Google's search engine, iPlayer and other sites.",
        "Copy of clientlib(48).css",
        "https://aquanx.com/",
        "whitehouse.gov 2.28.22 8.pdf",
        "Copy of clientlib(46).css",
        "Copy of clientlib.js(24).download",
        "whitehouse.gov 2.27.22 8.pdf",
        "443 Header\tHTTP/2 200 x powered by: PHP/7.4.29 set cookie: PHPSESSID=9158e16820bdbb5be0d1faa520b7dc19 path=/ expires: Thu 19 Nov 1981 08:52:00 GMT cache control: no store no cache must revalidate pragma: no cache content type: text/html charset=UTF 8 date: Thu 02 Feb 2023 13:37:37 GMT server: LiteSpeed alt svc: quic= :443 ma=2592000 v= 35 39 43 44",
        "Copy of clientlib.js(34).download",
        "Copy of clientlibs(3).css",
        "Copy of clientlib(36).css",
        "Copy of clientlib(49).css",
        "https://cdf5cxngkkxd.com/static/js/manifest.e4d52d2f9dae6cd41eb4.js",
        "Copy of clientlib(17).css",
        "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-e2b75d5cfe54ba9b7d678cb1c848421f.merged.js",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
        "Copy of clientlibs.js(4).download",
        "Copy of clientlib.js(43).download",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js 443 Script",
        "whitehouse.gov 2.27.22 3.pdf",
        "Copy of clientlib.js(58).download",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js",
        "Copy of clientlib.js(57).download",
        "Copy of clientlib.js(1).download",
        "Copy of clientlib.js(8).download",
        "Copy of clientlibs(2).css",
        "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "Copy of clientlib(14).css",
        "whitehouse.gov 2.27.22 2.pdf",
        "Copy of clientlib(35).css",
        "https://www.googletagmanager.com/gtag/js?id=G-56M7ZWVN9L",
        "Copy of clientlib.js(52).download",
        "Copy of clientlibs(4).css",
        "Copy of clientlib.js(33).download",
        "Copy of clientlib(50).css",
        "whitehouse.gov 2.27.22 5.pdf",
        "Copy of clientlib(51).css",
        "Copy of clientlib.js(51).download",
        "Copy of clientlib.js(36).download",
        "Copy of clientlib.js(28).download",
        "Copy of clientlib(25).css",
        "Copy of clientlib(32).css",
        "Copy of clientlib(3).css",
        "Copy of clientlib(45).css",
        "Copy of clientlibs.js(2).download",
        "Copy of clientlib(12).css",
        "Copy of clientlib(10).css",
        "https://tria.ge/240521-rxpf6ahd6w",
        "whitehouse.gov 2.27.22 6.pdf",
        "Copy of clientlib(9).css",
        "hxxps://myapplications[.]microsoft[.]com/",
        "https://m.bds247.vn//view/js/jquery6_1.js",
        "Copy of clientlib.js(53).download",
        "https://tria.ge/240521-r1yh8shd44",
        "Copy of clientlib.js(5).download",
        "whitehouse.govapi_2.27.22.pdf",
        "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
        "Copy of clientlib.js(32).download",
        "Copy of clientlib(28).css",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NF2ZT3",
        "Copy of clientlib.js(39).download",
        "Copy of clientlib(39).css",
        "Copy of clientlib(15).css",
        "Copy of clientlib.js(37).download",
        "https://m.bds247.vn//view/js/jquery6_1.js 443",
        "Copy of clientlib.js(41).download",
        "Copy of clientlib.js(38).download",
        "https://aquanx.com/js/bootstrap.js",
        "Copy of clientlib(27).css",
        "Copy of clientlib(19).css",
        "Copy of clientlib(13).css",
        "Copy of clientlib.js(17).download",
        "Copy of clientlib.js(55).download",
        "https://m.bds247.vn/lib/nivo-slider/slider.js",
        "Copy of clientlib(6).css",
        "https://cdf5cxngkkxd.com/static/js/vendor.084bf9e0e16f0b2b6faa.js",
        "Copy of clientlib.js(2).download",
        "Copy of clientlib.js(25).download",
        "Copy of clientlib(20).css",
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "Copy of clientlib(53).css",
        "Copy of clientlib.js(16).download",
        "https://www.psi.de/typo3temp/scriptmerger/uncompressed/head-bd4b8119586687574cf8f8529359d678.merged.css",
        "xml version= 1.0 encoding= utf 8 DOCTYPE html PUBLIC //WAPFORUM//DTD XHTML Mobile 1.0//EN http://www.wapforum.org/DTD/xhtml mobile10.dtd html xmlns= http://www.w3.org/1999/xhtml head meta http equiv= Content Type content= text/html charset=utf 8 / title mua bn nh t cho thu nh t sang nhng sang nhng ca hng /title meta name= copyright content= 2010 2020 bds247.vn / meta name= google site verification content= suyiBYZARDnZ4zGeoAiF VajqMQ0pgLGnEm69aZ aIY / meta name= robots content= index follow / meta name= key",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "Copy of clientlib.js(19).download",
        "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
        "Copy of clientlib(18).css",
        "Copy of clientlib(16).css",
        "Copy of clientlib.js(42).download",
        "Copy of clientlib(23).css",
        "Copy of clientlib.js(31).download",
        "Copy of clientlib(54).css",
        "Copy of clientlib.js(29).download",
        "Copy of clientlib(1).css",
        "Copy of clientlib(33).css",
        "Copy of clientlib(38).css",
        "whitehouse.gov 2.27.22 1.pdf",
        "Copy of clientlib(52).css",
        "Copy of clientlibs.js(1).download",
        "Copy of clientlib.js(4).download",
        "https://tria.ge/240521-ry949ahe2z/behavioral1",
        "Copy of clientlib.js(18).download",
        "Copy of clientlib.js(60).download",
        "https://m.bds247.vn/view/js/page.js 443 Script",
        "Copy of clientlibs.js.download",
        "Copy of clientlib.js(30).download",
        "[object Object] is a string representation of an object instance. Take this example: When the alert runs, it returns [object Object] in the alert modal. It tries to return a string representation of what was passed into alert, but because the engine sees this as an object, and not a string, it tells us that its an instance of an Object instead.",
        "xfe-URL-raksmart.com-stix2-2.1-export.json",
        "Copy of clientlib(43).css",
        "xfe-URL-Psi.de-stix2-2.1-export.json",
        "Copy of clientlib.js(56).download",
        "Copy of clientlib(2).css",
        "whitelists are really not the way forward unless you validate the integrity often Speedtest are also being screwed with ie allowing your neural controlled network out on a temp basis to prevent you from ousting the APT controlling your home broadband / wifi network",
        "Copy of clientlib(11).css",
        "Copy of clientlib(7).css",
        "Copy of clientlib(21).css",
        "whithouse.gov 2.27.22 4.pdf",
        "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
        "Copy of clientlib.js(23).download"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/danabot.g",
            "Selectedindex",
            "Win.virus.polyransom-5704625-0",
            "Alf:pua:block:iobit.r!mtb",
            "Vd",
            "Backdoor:win32/poison.e",
            "Telper:cert:softwarebundler:win32/bunpredelt",
            "Win32:cryptor"
          ],
          "industries": [
            "Technology",
            "Defense",
            "Chemical",
            "Transportation",
            "Media",
            "Telecommunications",
            "Education",
            "Healthcare",
            "Construction",
            "Biotechnology",
            "Government",
            "Finance",
            "Agriculture",
            "Energy"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 17,
  "pulses": [
    {
      "id": "65eea19a23474b8c7dca351f",
      "name": "All Items - find from the UA archive disk",
      "description": "Again have zero idea 'what these are' - just uploading from the 'archives' as I sort through things",
      "modified": "2025-12-24T08:28:47.628000",
      "created": "2024-03-11T06:15:54.351000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1165,
        "hostname": 866,
        "URL": 657,
        "FileHash-SHA256": 26,
        "email": 337,
        "FileHash-MD5": 12,
        "FileHash-SHA1": 8,
        "CIDR": 1
      },
      "indicator_count": 3072,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "116 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "553 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "664bd9b732ecaf1b3c3beddf",
      "name": "Found some problems - Files from the UAlberta Google Drive Archive",
      "description": "Been looking for these...Gifts from the University of Alberta to the World apparently\n*Please note: I emptied out the Drive, however, there was a significant amount of abuse re: Google and Microsoft Accounts at the University of Alberta (reported).\n*On the Google side I utilized: Drive (a little), Docs/Slides/Sheets (when groupwork was required)\n*On the Microsoft side I utilized: OneDrive, Office 365 (Word, PPT, Excel, and OneNote). I used to also have a personal microsoft account (OneNote, OneDrive, Skype).\nThese were the applications I lived on for my studies. I could access the Gmail/Microsoft accounts for the University (however - 'bad things' usually happen because of this). I have no access to my personal Microsoft Account (i.e. myself and other affected student(s) do not have access to our personal stuff.",
      "modified": "2024-09-03T00:02:13.980000",
      "created": "2024-05-20T23:16:07.255000",
      "tags": [
        "contact",
        "quick",
        "destination",
        "entry",
        "safety",
        "local",
        "health",
        "travel",
        "notification",
        "considerations",
        "service",
        "criminal",
        "showit",
        "click",
        "outcome",
        "step",
        "please",
        "class",
        "questions set",
        "question set",
        "unlock",
        "continue",
        "jointfilingyes",
        "jointfilingno",
        "minimum req",
        "domicileresusno",
        "joint sponsor",
        "sponsorjoint",
        "path",
        "href",
        "span",
        "activetab",
        "starton",
        "newpage",
        "searchq",
        "datasia",
        "datacon",
        "segfilter",
        "subsite",
        "issuance agency",
        "visas",
        "null",
        "state",
        "dialog field",
        "tabpanel",
        "recaptcha",
        "nameinputvisa",
        "fullnameinput1",
        "license headers",
        "tools",
        "templates",
        "sia contact",
        "visa",
        "website",
        "phoneregexp",
        "emailregexp",
        "azaz",
        "urlpattern",
        "example starter",
        "javascript",
        "fetch",
        "comptwo",
        "compone",
        "dateofbirth",
        "function",
        "date",
        "passport",
        "nameinput",
        "fullnameinput",
        "adult passport",
        "child passport",
        "new child",
        "new adult",
        "new passport",
        "datepicker",
        "ds5504",
        "hideit",
        "infinity",
        "false",
        "jquery",
        "error",
        "body",
        "trident",
        "simple",
        "turn",
        "back",
        "calendar",
        "format",
        "february",
        "april",
        "june",
        "august",
        "show",
        "page has",
        "bcdate",
        "col1child",
        "col2child",
        "coldatechild",
        "rowdisplay",
        "val1",
        "val2",
        "repaginate",
        "grab",
        "jandec",
        "86400000",
        "current",
        "namerbcontactme",
        "agency",
        "compliment",
        "complaint",
        "passportfees",
        "customerservice",
        "bymail",
        "namerbcategory",
        "brokenlink",
        "search",
        "departuredate",
        "calendar date",
        "picker",
        "change",
        "month",
        "vital",
        "records form",
        "component js",
        "select",
        "please enter",
        "azaz09",
        "dddddd",
        "woff2",
        "woff",
        "truetype",
        "css document",
        "efefef",
        "ffffff",
        "gradienttype0",
        "galaxy",
        "nexus",
        "iphone5",
        "abtn",
        "bbtn",
        "cbtn",
        "dbtn",
        "ebtn",
        "fbtn",
        "gbtn",
        "hbtn",
        "ibtn",
        "media query",
        "from",
        "fce68e",
        "font family",
        "bold",
        "document",
        "cc3333",
        "b7b7b7",
        "e2edff",
        "ced9ea",
        "pm author",
        "ipca csi",
        "helvetica",
        "arial",
        "cq aem",
        "feed classes",
        "f2cd54",
        "f4d97e",
        "portrait",
        "landscape",
        "ipad",
        "declare",
        "immigrant",
        "visa navigation",
        "navigation css",
        "georgia",
        "times new",
        "roman",
        "times",
        "verdana",
        "photomodal",
        "styles media",
        "ff0000",
        "queries",
        "form component",
        "typetext",
        "queries media",
        "phone media",
        "tablet styles",
        "media queries",
        "jumbo sized",
        "copyright",
        "gpl version",
        "http",
        "alpha",
        "button",
        "out width",
        "ui css",
        "framework",
        "icons",
        "misc",
        "mini",
        "input",
        "label",
        "textarea",
        "overlays",
        "csi page",
        "embassy info",
        "embassy data",
        "embassy names",
        "end adjust",
        "embassy nameso",
        "pages",
        "e1a04d",
        "c0c0c0",
        "ffffff url",
        "us survey",
        "component css",
        "country list",
        "e7eceb",
        "important",
        "additional css",
        "wizard",
        "corner radius",
        "f97800",
        "c61700",
        "largestbox",
        "thisbox",
        "csi navigation",
        "ui autocomplete",
        "ui menu",
        "noticeid",
        "countnote",
        "largestnote",
        "thisnote",
        "desktops",
        "43px",
        "42px",
        "large",
        "aem interface",
        "styles",
        "web email",
        "ytconfig",
        "typeerror",
        "facebook pixel",
        "pixel code",
        "symbol",
        "fblog",
        "typeof",
        "iterator",
        "pageview",
        "pixel",
        "facebook",
        "config",
        "meta",
        "propname",
        "dpjquerydpuuid",
        "this",
        "next",
        "atom",
        "cookie",
        "iframe",
        "close",
        "string",
        "number",
        "edge",
        "regexp",
        "silk",
        "sxa0",
        "object",
        "opera",
        "android",
        "void",
        "form",
        "UAlberta",
        "Android",
        "Mac",
        "iPhone",
        "Gov Alberta",
        "AWS",
        "AZURE",
        "ENTRA",
        "iCloud",
        "Telus",
        "Bitdefender",
        "Norton"
      ],
      "references": [
        "Copy of clientlib.js(1).download",
        "Copy of clientlib.js(2).download",
        "Copy of clientlib.js(5).download",
        "Copy of clientlib.js(7).download",
        "Copy of clientlib.js(4).download",
        "Copy of clientlib.js(10).download",
        "Copy of clientlib.js(8).download",
        "Copy of clientlib.js(11).download",
        "Copy of clientlib.js(12).download",
        "Copy of clientlib.js(13).download",
        "Copy of clientlib.js(14).download",
        "Copy of clientlib.js(9).download",
        "Copy of clientlib.js(16).download",
        "Copy of clientlib.js(17).download",
        "Copy of clientlib.js(18).download",
        "Copy of clientlib.js(3).download",
        "Copy of clientlib.js(19).download",
        "Copy of clientlib.js(15).download",
        "Copy of clientlib.js(22).download",
        "Copy of clientlib.js(23).download",
        "Copy of clientlib.js(21).download",
        "Copy of clientlib.js(26).download",
        "Copy of clientlib.js(25).download",
        "Copy of clientlib.js(24).download",
        "Copy of clientlib.js(31).download",
        "Copy of clientlib.js(28).download",
        "Copy of clientlib.js(30).download",
        "Copy of clientlib.js(32).download",
        "Copy of clientlib.js(29).download",
        "Copy of clientlib.js(34).download",
        "Copy of clientlib.js(35).download",
        "Copy of clientlib.js(37).download",
        "Copy of clientlib.js(36).download",
        "Copy of clientlib.js(38).download",
        "Copy of clientlib.js(39).download",
        "Copy of clientlib.js(33).download",
        "Copy of clientlib.js(44).download",
        "Copy of clientlib.js(43).download",
        "Copy of clientlib.js(41).download",
        "Copy of clientlib.js(42).download",
        "Copy of clientlib.js(45).download",
        "Copy of clientlib.js(51).download",
        "Copy of clientlib.js(56).download",
        "Copy of clientlib.js(55).download",
        "Copy of clientlib.js(54).download",
        "Copy of clientlib.js(57).download",
        "Copy of clientlib.js(52).download",
        "Copy of clientlib.js(53).download",
        "Copy of clientlib.js(60).download",
        "Copy of clientlib(1).css",
        "Copy of clientlib.js(59).download",
        "Copy of clientlib(3).css",
        "Copy of clientlib(2).css",
        "Copy of clientlib(5).css",
        "Copy of clientlib.js(58).download",
        "Copy of clientlib(8).css",
        "Copy of clientlib(10).css",
        "Copy of clientlib(7).css",
        "Copy of clientlib(6).css",
        "Copy of clientlib(12).css",
        "Copy of clientlib(13).css",
        "Copy of clientlib(9).css",
        "Copy of clientlib(4).css",
        "Copy of clientlib(14).css",
        "Copy of clientlib(17).css",
        "Copy of clientlib(15).css",
        "Copy of clientlib(19).css",
        "Copy of clientlib(18).css",
        "Copy of clientlib(11).css",
        "Copy of clientlib(20).css",
        "Copy of clientlib(16).css",
        "Copy of clientlib(23).css",
        "Copy of clientlib(24).css",
        "Copy of clientlib(26).css",
        "Copy of clientlib(25).css",
        "Copy of clientlib(28).css",
        "Copy of clientlib(22).css",
        "Copy of clientlib(27).css",
        "Copy of clientlib(31).css",
        "Copy of clientlib(29).css",
        "Copy of clientlib(30).css",
        "Copy of clientlib(32).css",
        "Copy of clientlib(34).css",
        "Copy of clientlib(35).css",
        "Copy of clientlib(33).css",
        "Copy of clientlib(38).css",
        "Copy of clientlib(37).css",
        "Copy of clientlib(36).css",
        "Copy of clientlib(40).css",
        "Copy of clientlib(39).css",
        "Copy of clientlib(43).css",
        "Copy of clientlib(21).css",
        "Copy of clientlib(41).css",
        "Copy of clientlib(44).css",
        "Copy of clientlib(42).css",
        "Copy of clientlib(46).css",
        "Copy of clientlib(45).css",
        "Copy of clientlib(47).css",
        "Copy of clientlib(48).css",
        "Copy of clientlib(49).css",
        "Copy of clientlib(50).css",
        "Copy of clientlib(52).css",
        "Copy of clientlib(54).css",
        "Copy of clientlibs.js(3).download",
        "Copy of clientlib(53).css",
        "Copy of clientlibs.js(2).download",
        "Copy of clientlibs(3).css",
        "Copy of clientlib(51).css",
        "Copy of clientlibs(1).css",
        "Copy of clientlibs(2).css",
        "Copy of clientlibs.js.download",
        "Copy of clientlibs.js(4).download",
        "Copy of clientlibs(5).css",
        "Copy of clientlibs.css",
        "Copy of clientlibs(4).css",
        "Copy of dir (1).c9r",
        "Copy of clientlib(55).css",
        "Copy of iframe_api",
        "Copy of fbevents.js.download",
        "Copy of clientlibs.js(1).download",
        "Copy of js",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
        "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
        "hxxps://portal[.]office[.]com/Account",
        "hxxps://myapplications[.]microsoft[.]com/",
        "https://tria.ge/240521-rvybaahb79",
        "https://tria.ge/240521-rxpf6ahd6w",
        "https://tria.ge/240521-r1yh8shd44",
        "https://tria.ge/240521-ry949ahe2z/behavioral1",
        "https://tria.ge/240521-r3mvhshd83"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada",
        "Mexico",
        "Anguilla",
        "Aruba",
        "Panama",
        "Ukraine",
        "Trinidad and Tobago",
        "Saint Vincent and the Grenadines",
        "Saint Martin (French part)",
        "Sint Maarten (Dutch part)",
        "Philippines",
        "Netherlands",
        "Cura\u00e7ao",
        "Georgia",
        "Tanzania, United Republic of",
        "Costa Rica",
        "Guatemala",
        "Japan",
        "Barbados"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        }
      ],
      "industries": [
        "Education",
        "Technology",
        "Government",
        "Healthcare",
        "Biotechnology",
        "Telecommunications",
        "Energy",
        "Construction",
        "Chemical",
        "Agriculture",
        "Finance",
        "Media",
        "Defense",
        "Transportation"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 251,
        "hostname": 188,
        "FileHash-SHA256": 142,
        "URL": 69,
        "FileHash-MD5": 77,
        "FileHash-SHA1": 77
      },
      "indicator_count": 804,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 133,
      "modified_text": "594 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6639853fc403f7be5bd6f27d",
      "name": "Facebook+",
      "description": "",
      "modified": "2024-05-07T01:34:55.365000",
      "created": "2024-05-07T01:34:55.365000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65eea19a23474b8c7dca351f",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Phone2209",
        "id": "281168",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1165,
        "hostname": 866,
        "URL": 657,
        "FileHash-SHA256": 26,
        "email": 337,
        "FileHash-MD5": 12,
        "FileHash-SHA1": 8,
        "CIDR": 1
      },
      "indicator_count": 3072,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1,
      "modified_text": "713 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "657096b22a51f1cc56dcfb53",
      "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
      "description": "",
      "modified": "2023-12-06T15:43:46.083000",
      "created": "2023-12-06T15:43:46.083000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 802,
        "hostname": 392,
        "domain": 134,
        "FileHash-SHA256": 82,
        "FileHash-MD5": 1
      },
      "indicator_count": 1411,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e456bdbf8ea8d0d504a",
      "name": "whitehouse.gov",
      "description": "",
      "modified": "2023-12-06T15:07:49.577000",
      "created": "2023-12-06T15:07:49.577000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 449,
        "hostname": 639,
        "domain": 245,
        "URL": 1609,
        "FileHash-MD5": 4
      },
      "indicator_count": 2946,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708aa1dca4e6c505e4fc9e",
      "name": "Botnet c&c",
      "description": "",
      "modified": "2023-12-06T14:52:16.286000",
      "created": "2023-12-06T14:52:16.286000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 214,
        "hostname": 334,
        "URL": 1182,
        "FileHash-SHA256": 33
      },
      "indicator_count": 1763,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707f8475d8a8785dfc5a2f",
      "name": "Zetalytics API",
      "description": "",
      "modified": "2023-12-06T14:04:52.250000",
      "created": "2023-12-06T14:04:52.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 754,
        "hostname": 833,
        "domain": 441,
        "URL": 2375,
        "CIDR": 5,
        "FileHash-MD5": 2,
        "email": 1
      },
      "indicator_count": 4411,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707f7f79257c3b4f276f35",
      "name": "whitehouse.govapi_2.27.22",
      "description": "",
      "modified": "2023-12-06T14:04:47.874000",
      "created": "2023-12-06T14:04:47.874000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 489,
        "hostname": 405,
        "domain": 306,
        "URL": 1451,
        "email": 1,
        "FileHash-MD5": 4
      },
      "indicator_count": 2656,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "63dbbf6ae4f5433c2bab52e9",
      "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
      "description": "A guide to some of the key methods used by the web browser, jQuery, to create web pages and add links to the search engine and other parts of its web address system, as well as the address bar.",
      "modified": "2023-03-04T13:00:43.098000",
      "created": "2023-02-02T13:49:30.620000",
      "tags": [
        "null",
        "copyright",
        "jan sorgalla",
        "built",
        "bill scott",
        "http",
        "error",
        "function",
        "title",
        "method",
        "play",
        "fast",
        "click",
        "return",
        "href",
        "target",
        "span",
        "pass",
        "linear",
        "timebuff",
        "block",
        "trigger",
        "nivoslider",
        "display",
        "width",
        "show",
        "next",
        "arrow",
        "restart",
        "stop",
        "iframe",
        "alpha",
        "factory",
        "type",
        "handle",
        "sizzle",
        "match",
        "check",
        "make sure",
        "elem",
        "name",
        "regexp",
        "hooks",
        "false",
        "date",
        "class",
        "internal",
        "done",
        "bind",
        "test",
        "body",
        "copy",
        "hold",
        "mozilla",
        "logic",
        "flash",
        "jquery",
        "fall",
        "bubble",
        "prop",
        "meta",
        "middle",
        "mark",
        "thus",
        "form",
        "script script",
        "a li",
        "div div",
        "mua bn",
        "link",
        "a div",
        "trang ch",
        "gii thiu",
        "tin tc",
        "header http2",
        "gmt cache",
        "gmt server",
        "litespeed",
        "443 ma2592000",
        "172.217.16.232",
        "http://lhr48s28-in-f8.1e100.net"
      ],
      "references": [
        "[object Object] is a string representation of an object instance. Take this example: When the alert runs, it returns [object Object] in the alert modal. It tries to return a string representation of what was passed into alert, but because the engine sees this as an object, and not a string, it tells us that its an instance of an Object instead.",
        "443 Header\tHTTP/2 200 x powered by: PHP/7.4.29 set cookie: PHPSESSID=9158e16820bdbb5be0d1faa520b7dc19 path=/ expires: Thu 19 Nov 1981 08:52:00 GMT cache control: no store no cache must revalidate pragma: no cache content type: text/html charset=UTF 8 date: Thu 02 Feb 2023 13:37:37 GMT server: LiteSpeed alt svc: quic= :443 ma=2592000 v= 35 39 43 44",
        "whitelists are really not the way forward unless you validate the integrity often Speedtest are also being screwed with ie allowing your neural controlled network out on a temp basis to prevent you from ousting the APT controlling your home broadband / wifi network",
        "xml version= 1.0 encoding= utf 8 DOCTYPE html PUBLIC //WAPFORUM//DTD XHTML Mobile 1.0//EN http://www.wapforum.org/DTD/xhtml mobile10.dtd html xmlns= http://www.w3.org/1999/xhtml head meta http equiv= Content Type content= text/html charset=utf 8 / title mua bn nh t cho thu nh t sang nhng sang nhng ca hng /title meta name= copyright content= 2010 2020 bds247.vn / meta name= google site verification content= suyiBYZARDnZ4zGeoAiF VajqMQ0pgLGnEm69aZ aIY / meta name= robots content= index follow / meta name= key",
        "https://m.bds247.vn//view/js/jquery6_1.js 443",
        "https://www.googletagmanager.com/gtag/js?id=G-56M7ZWVN9L",
        "https://m.bds247.vn/lib/nivo-slider/slider.js 443 Script",
        "https://m.bds247.vn/view/js/page.js 443 Script",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js 443 Script",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.pikachoose.js",
        "This is the full text of the XHTML mobile10.dtd.xml, which is based on the code created by the developers of Google's search engine, iPlayer and other sites.",
        "https://m.bds247.vn//view/js/jquery6_1.js",
        "https://m.bds247.vn/lib/nivo-slider/slider.js",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 802,
        "hostname": 392,
        "FileHash-SHA256": 82,
        "domain": 134,
        "FileHash-MD5": 1
      },
      "indicator_count": 1411,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 93,
      "modified_text": "1142 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "jquery.data",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "jquery.data",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776660390.0733569
}