{
  "type": "Domain",
  "indicator": "kints.ch",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/kints.ch",
    "alexa": "http://www.alexa.com/siteinfo/kints.ch",
    "indicator": "kints.ch",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 4132426264,
      "indicator": "kints.ch",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "68d877d6231fc1cbe1792ee1",
          "name": "PolyRansom attack through malicious actor on threat platforms",
          "description": "Virlock , PolyRansom and multiple other attacks through malicious actor using social engineering tactics. Has a rigged platform. Goal -\n to gain complete command and control of users in great platforms. Has infected at least a single device.\n#domainrobot #socialengineeeing  #Tofsee\n#Trojan:Win32/Vflooder\n#Unix.Dropper.Mirai-7135870-0\n#Virus.Virlock/Nabucur\n#Win.Packer.pkr_ce1a-9980177-0\n#Win.Virus.PolyRansom",
          "modified": "2025-10-27T22:02:25.163000",
          "created": "2025-09-27T23:48:38.895000",
          "tags": [
            "iocs",
            "indicator role",
            "write c",
            "intel",
            "ms windows",
            "medium",
            "pe32",
            "delete",
            "ids detections",
            "yara detections",
            "write",
            "malware",
            "delete c",
            "windows",
            "high",
            "port",
            "encrypt",
            "tofsee",
            "stream",
            "passive dns",
            "http",
            "ip address",
            "related nids",
            "files location",
            "united states",
            "united",
            "win32",
            "trojan",
            "mtb may",
            "twitter",
            "hellspawn",
            "worm",
            "title",
            "emails",
            "servers",
            "get http",
            "dns resolutions",
            "http traffic",
            "command",
            "control ta0011",
            "protocol t1071",
            "match info",
            "t1573 severity",
            "info",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "present sep",
            "aaaa",
            "resolved ips",
            "ip traffic",
            "displayname",
            "yara rule",
            "loaderid",
            "name servers",
            "urls",
            "domain robot",
            "mail",
            "moved",
            "media gmbh",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "manager",
            "shutdown",
            "host",
            "generic http",
            "exe upload",
            "inbound",
            "outbound",
            "markus",
            "certificate",
            "record value",
            "object",
            "path",
            "server",
            "registrar abuse",
            "contact email",
            "contact phone",
            "registrar iana",
            "registrar url",
            "diablo",
            "gandi sas",
            "gandi",
            "diablo attacks",
            "bluemind",
            "alberta",
            "domain add",
            "asn as16625",
            "akamai",
            "less whois",
            "registrar",
            "metrobytmobile",
            "t mobile",
            "metro",
            "present jul",
            "present jun",
            "present aug",
            "germany unknown",
            "germany",
            "invalid url",
            "ipv4 add",
            "frankfurt",
            "main",
            "no entries",
            "entrust",
            "hostname add",
            "files loading",
            "mimic",
            "first address",
            "medium attempts",
            "process",
            "explorer",
            "windows startup",
            "kuwiqsma",
            "match medium",
            "medium installs",
            "installs",
            "t regdword",
            "user",
            "ntcreatefile",
            "filehandle",
            "createfilew",
            "getfilesize",
            "blpdqe",
            "jjqcpluanwwhg",
            "u0012",
            "desiredaccess",
            "keyhandle",
            "ntopenkeyex",
            "u001aw",
            "u0018",
            "read",
            "next",
            "tags none",
            "file type",
            "date september",
            "am size",
            "imphash pehash",
            "richhash",
            "south korea",
            "taiwan as3462",
            "as21928",
            "china as4134",
            "as4766 korea",
            "china as4837",
            "as9318 sk",
            "as701 verizon",
            "verizon",
            "tcp syn",
            "infectednight",
            "resolverror",
            "tref neutral",
            "ck technique",
            "technique id",
            "tofsee high",
            "overview whois",
            "pulses",
            "tags",
            "related tags",
            "more external",
            "resources whois",
            "urlvoid",
            "tavao.exe",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "defense evasion",
            "spawns",
            "access att",
            "ascii text",
            "pattern match",
            "mitre att",
            "size",
            "meta",
            "null",
            "error",
            "click",
            "roboto",
            "hybrid",
            "general",
            "local",
            "starfield",
            "strings",
            "refresh",
            "tools",
            "onload",
            "span",
            "iframe",
            "found",
            "t1480 execution",
            "backdoor",
            "a domains",
            "russia",
            "next associated",
            "link",
            "windir",
            "interesting",
            "show technique",
            "ck matrix",
            "network traffic",
            "t1071",
            "t1057",
            "lowfi",
            "gameforprofits",
            "game att",
            "night got",
            "job done infected"
          ],
          "references": [
            "DiabloFans ClapBack: Google. Com",
            "Crowdsourced IDS: ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check  Rule Match",
            "CS\u2019d IDS: ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) Rule Match",
            "Crowdsourced IDS: Matches rule SURICATA HTTP missing Host header",
            "Crowdsourced IDS: Unique rule identifier: This rule belongs to a private collection",
            "MetrobyT-mobile",
            "UA Alberta | Somehow I don\u2019t think this is part of a match but rather an attack. Mimic",
            "Unix.Dropper.Mirai inc. 100.181.126.203 \u2022 United States\tAS21928 t-mobile usa inc.",
            "Unix.Dropper.Mirai inc. 1 Korea Telecom 1.107.218.24 \u2022 South Korea\tAS4766",
            "Unix.Dropper.Mirai inc. 1 Telstra Corporation Ltd 1.125.165.62 \u2022 Australia AS1221 Telstra",
            "Unix.Dropper.Mirai inc. 1 Verizon : 100.10.95.119 United States \u2022 AS701 Verizon",
            "Sigma: Matches rule System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "Virus.Virlock/Nabucur",
              "display_name": "Virus.Virlock/Nabucur",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Unix.Dropper.Mirai-7135870-0",
              "display_name": "Unix.Dropper.Mirai-7135870-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 450,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 2092,
            "URL": 646,
            "domain": 593,
            "SSLCertFingerprint": 9,
            "hostname": 657,
            "email": 13
          },
          "indicator_count": 4895,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "174 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d877e28416d81633bae1ad",
          "name": "PolyRansom attack through malicious actor on threat platforms",
          "description": "Virlock , PolyRansom and multiple other attacks through malicious actor using social engineering tactics. Has a rigged platform. Goal -\n to gain complete command and control of users in great platforms. Has infected at least a single device.\n#domainrobot #socialengineeeing  #Tofsee\n#Trojan:Win32/Vflooder\n#Unix.Dropper.Mirai-7135870-0\n#Virus.Virlock/Nabucur\n#Win.Packer.pkr_ce1a-9980177-0\n#Win.Virus.PolyRansom",
          "modified": "2025-10-27T22:02:25.163000",
          "created": "2025-09-27T23:48:50.976000",
          "tags": [
            "iocs",
            "indicator role",
            "write c",
            "intel",
            "ms windows",
            "medium",
            "pe32",
            "delete",
            "ids detections",
            "yara detections",
            "write",
            "malware",
            "delete c",
            "windows",
            "high",
            "port",
            "encrypt",
            "tofsee",
            "stream",
            "passive dns",
            "http",
            "ip address",
            "related nids",
            "files location",
            "united states",
            "united",
            "win32",
            "trojan",
            "mtb may",
            "twitter",
            "hellspawn",
            "worm",
            "title",
            "emails",
            "servers",
            "get http",
            "dns resolutions",
            "http traffic",
            "command",
            "control ta0011",
            "protocol t1071",
            "match info",
            "t1573 severity",
            "info",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "present sep",
            "aaaa",
            "resolved ips",
            "ip traffic",
            "displayname",
            "yara rule",
            "loaderid",
            "name servers",
            "urls",
            "domain robot",
            "mail",
            "moved",
            "media gmbh",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "manager",
            "shutdown",
            "host",
            "generic http",
            "exe upload",
            "inbound",
            "outbound",
            "markus",
            "certificate",
            "record value",
            "object",
            "path",
            "server",
            "registrar abuse",
            "contact email",
            "contact phone",
            "registrar iana",
            "registrar url",
            "diablo",
            "gandi sas",
            "gandi",
            "diablo attacks",
            "bluemind",
            "alberta",
            "domain add",
            "asn as16625",
            "akamai",
            "less whois",
            "registrar",
            "metrobytmobile",
            "t mobile",
            "metro",
            "present jul",
            "present jun",
            "present aug",
            "germany unknown",
            "germany",
            "invalid url",
            "ipv4 add",
            "frankfurt",
            "main",
            "no entries",
            "entrust",
            "hostname add",
            "files loading",
            "mimic",
            "first address",
            "medium attempts",
            "process",
            "explorer",
            "windows startup",
            "kuwiqsma",
            "match medium",
            "medium installs",
            "installs",
            "t regdword",
            "user",
            "ntcreatefile",
            "filehandle",
            "createfilew",
            "getfilesize",
            "blpdqe",
            "jjqcpluanwwhg",
            "u0012",
            "desiredaccess",
            "keyhandle",
            "ntopenkeyex",
            "u001aw",
            "u0018",
            "read",
            "next",
            "tags none",
            "file type",
            "date september",
            "am size",
            "imphash pehash",
            "richhash",
            "south korea",
            "taiwan as3462",
            "as21928",
            "china as4134",
            "as4766 korea",
            "china as4837",
            "as9318 sk",
            "as701 verizon",
            "verizon",
            "tcp syn",
            "infectednight",
            "resolverror",
            "tref neutral",
            "ck technique",
            "technique id",
            "tofsee high",
            "overview whois",
            "pulses",
            "tags",
            "related tags",
            "more external",
            "resources whois",
            "urlvoid",
            "tavao.exe",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "defense evasion",
            "spawns",
            "access att",
            "ascii text",
            "pattern match",
            "mitre att",
            "size",
            "meta",
            "null",
            "error",
            "click",
            "roboto",
            "hybrid",
            "general",
            "local",
            "starfield",
            "strings",
            "refresh",
            "tools",
            "onload",
            "span",
            "iframe",
            "found",
            "t1480 execution",
            "backdoor",
            "a domains",
            "russia",
            "next associated",
            "link",
            "windir",
            "interesting",
            "show technique",
            "ck matrix",
            "network traffic",
            "t1071",
            "t1057",
            "lowfi",
            "gameforprofits",
            "game att",
            "night got",
            "job done infected"
          ],
          "references": [
            "DiabloFans ClapBack: Google. Com",
            "Crowdsourced IDS: ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check  Rule Match",
            "CS\u2019d IDS: ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) Rule Match",
            "Crowdsourced IDS: Matches rule SURICATA HTTP missing Host header",
            "Crowdsourced IDS: Unique rule identifier: This rule belongs to a private collection",
            "MetrobyT-mobile",
            "UA Alberta | Somehow I don\u2019t think this is part of a match but rather an attack. Mimic",
            "Unix.Dropper.Mirai inc. 100.181.126.203 \u2022 United States\tAS21928 t-mobile usa inc.",
            "Unix.Dropper.Mirai inc. 1 Korea Telecom 1.107.218.24 \u2022 South Korea\tAS4766",
            "Unix.Dropper.Mirai inc. 1 Telstra Corporation Ltd 1.125.165.62 \u2022 Australia AS1221 Telstra",
            "Unix.Dropper.Mirai inc. 1 Verizon : 100.10.95.119 United States \u2022 AS701 Verizon",
            "Sigma: Matches rule System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "Virus.Virlock/Nabucur",
              "display_name": "Virus.Virlock/Nabucur",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Unix.Dropper.Mirai-7135870-0",
              "display_name": "Unix.Dropper.Mirai-7135870-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 450,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 2092,
            "URL": 646,
            "domain": 593,
            "SSLCertFingerprint": 9,
            "hostname": 657,
            "email": 13
          },
          "indicator_count": 4895,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "174 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68cd76f1888c22a2e105e524",
          "name": "Sign in - Google Accounts | Ransomware G3nasom",
          "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
          "modified": "2025-10-19T14:00:01.535000",
          "created": "2025-09-19T15:29:53.126000",
          "tags": [
            "sign",
            "google account",
            "email",
            "forgot email",
            "private window",
            "learn",
            "guest mode",
            "next create",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "owotrus ca",
            "limited",
            "server ca",
            "python",
            "write",
            "trojan",
            "guard",
            "win64",
            "accept",
            "updater",
            "launcher",
            "malware",
            "contacted",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "passive dns",
            "google trust",
            "ip address",
            "related nids",
            "united",
            "url http",
            "present aug",
            "present sep",
            "present jul",
            "unknown aaaa",
            "domain",
            "title",
            "body",
            "trojandropper",
            "mtb sep",
            "meta",
            "next associated",
            "win32upatre sep",
            "backdoor",
            "ipv4",
            "moved",
            "ddos",
            "data upload",
            "extraction",
            "iocs",
            "failed",
            "source url",
            "indicato",
            "mat my",
            "data",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "found",
            "command",
            "initial access",
            "spawns",
            "chrome",
            "gmt content",
            "avast avg",
            "next http",
            "ascii text",
            "size",
            "pattern match",
            "mitre att",
            "error",
            "null",
            "android",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "trident",
            "write c",
            "medium",
            "search",
            "show",
            "high",
            "push",
            "service",
            "ms defender",
            "files matching",
            "number",
            "hide samples",
            "date hash",
            "next yara",
            "emotet",
            "g3nasom",
            "entries",
            "alerts show",
            "ck technique",
            "technique id",
            "io control",
            "anomalous",
            "geofencing",
            "sha256 add",
            "pulse pulses",
            "copy"
          ],
          "references": [
            "http://accounts.google.com/v3/signin/identifier",
            "Yara Detection: Cabinet _Archive",
            "Banking Malware"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/G3nasom",
              "display_name": "ALF:Trojan:Win32/G3nasom",
              "target": null
            },
            {
              "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Backdoor:Win32/Berbew",
              "display_name": "Backdoor:Win32/Berbew",
              "target": "/malware/Backdoor:Win32/Berbew"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.KDS!MTB",
              "display_name": "Trojan:Win32/Emotet.KDS!MTB",
              "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 531,
            "FileHash-SHA256": 1069,
            "URL": 1607,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 187,
            "SSLCertFingerprint": 25,
            "domain": 188,
            "email": 2
          },
          "indicator_count": 3884,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "182 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Unix.Dropper.Mirai inc. 1 Korea Telecom 1.107.218.24 \u2022 South Korea\tAS4766",
        "DiabloFans ClapBack: Google. Com",
        "Crowdsourced IDS: Matches rule SURICATA HTTP missing Host header",
        "Yara Detection: Cabinet _Archive",
        "CS\u2019d IDS: ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) Rule Match",
        "Unix.Dropper.Mirai inc. 1 Telstra Corporation Ltd 1.125.165.62 \u2022 Australia AS1221 Telstra",
        "Unix.Dropper.Mirai inc. 1 Verizon : 100.10.95.119 United States \u2022 AS701 Verizon",
        "Banking Malware",
        "http://accounts.google.com/v3/signin/identifier",
        "Crowdsourced IDS: ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check  Rule Match",
        "Sigma: Matches rule System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
        "UA Alberta | Somehow I don\u2019t think this is part of a match but rather an attack. Mimic",
        "Crowdsourced IDS: Unique rule identifier: This rule belongs to a private collection",
        "MetrobyT-mobile",
        "Unix.Dropper.Mirai inc. 100.181.126.203 \u2022 United States\tAS21928 t-mobile usa inc."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/vflooder",
            "Win.virus.polyransom-5704625-0",
            "Win.ransomware.gandcrab-10044141-0\t(renamed g3nasom)",
            "Emotet",
            "Trojandropper:win32/muldrop.v!mtb",
            "Unix.dropper.mirai-7135870-0",
            "Backdoor:win32/berbew",
            "Upatre",
            "Tofsee",
            "Win.trojan.barys-10005825-0",
            "Trojan:win32/emotet.kds!mtb",
            "Alf:trojan:win32/g3nasom",
            "Virus.virlock/nabucur",
            "Win.packer.pkr_ce1a-9980177-0"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "68d877d6231fc1cbe1792ee1",
      "name": "PolyRansom attack through malicious actor on threat platforms",
      "description": "Virlock , PolyRansom and multiple other attacks through malicious actor using social engineering tactics. Has a rigged platform. Goal -\n to gain complete command and control of users in great platforms. Has infected at least a single device.\n#domainrobot #socialengineeeing  #Tofsee\n#Trojan:Win32/Vflooder\n#Unix.Dropper.Mirai-7135870-0\n#Virus.Virlock/Nabucur\n#Win.Packer.pkr_ce1a-9980177-0\n#Win.Virus.PolyRansom",
      "modified": "2025-10-27T22:02:25.163000",
      "created": "2025-09-27T23:48:38.895000",
      "tags": [
        "iocs",
        "indicator role",
        "write c",
        "intel",
        "ms windows",
        "medium",
        "pe32",
        "delete",
        "ids detections",
        "yara detections",
        "write",
        "malware",
        "delete c",
        "windows",
        "high",
        "port",
        "encrypt",
        "tofsee",
        "stream",
        "passive dns",
        "http",
        "ip address",
        "related nids",
        "files location",
        "united states",
        "united",
        "win32",
        "trojan",
        "mtb may",
        "twitter",
        "hellspawn",
        "worm",
        "title",
        "emails",
        "servers",
        "get http",
        "dns resolutions",
        "http traffic",
        "command",
        "control ta0011",
        "protocol t1071",
        "match info",
        "t1573 severity",
        "info",
        "request",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "response",
        "present sep",
        "aaaa",
        "resolved ips",
        "ip traffic",
        "displayname",
        "yara rule",
        "loaderid",
        "name servers",
        "urls",
        "domain robot",
        "mail",
        "moved",
        "media gmbh",
        "info file",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "manager",
        "shutdown",
        "host",
        "generic http",
        "exe upload",
        "inbound",
        "outbound",
        "markus",
        "certificate",
        "record value",
        "object",
        "path",
        "server",
        "registrar abuse",
        "contact email",
        "contact phone",
        "registrar iana",
        "registrar url",
        "diablo",
        "gandi sas",
        "gandi",
        "diablo attacks",
        "bluemind",
        "alberta",
        "domain add",
        "asn as16625",
        "akamai",
        "less whois",
        "registrar",
        "metrobytmobile",
        "t mobile",
        "metro",
        "present jul",
        "present jun",
        "present aug",
        "germany unknown",
        "germany",
        "invalid url",
        "ipv4 add",
        "frankfurt",
        "main",
        "no entries",
        "entrust",
        "hostname add",
        "files loading",
        "mimic",
        "first address",
        "medium attempts",
        "process",
        "explorer",
        "windows startup",
        "kuwiqsma",
        "match medium",
        "medium installs",
        "installs",
        "t regdword",
        "user",
        "ntcreatefile",
        "filehandle",
        "createfilew",
        "getfilesize",
        "blpdqe",
        "jjqcpluanwwhg",
        "u0012",
        "desiredaccess",
        "keyhandle",
        "ntopenkeyex",
        "u001aw",
        "u0018",
        "read",
        "next",
        "tags none",
        "file type",
        "date september",
        "am size",
        "imphash pehash",
        "richhash",
        "south korea",
        "taiwan as3462",
        "as21928",
        "china as4134",
        "as4766 korea",
        "china as4837",
        "as9318 sk",
        "as701 verizon",
        "verizon",
        "tcp syn",
        "infectednight",
        "resolverror",
        "tref neutral",
        "ck technique",
        "technique id",
        "tofsee high",
        "overview whois",
        "pulses",
        "tags",
        "related tags",
        "more external",
        "resources whois",
        "urlvoid",
        "tavao.exe",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "defense evasion",
        "spawns",
        "access att",
        "ascii text",
        "pattern match",
        "mitre att",
        "size",
        "meta",
        "null",
        "error",
        "click",
        "roboto",
        "hybrid",
        "general",
        "local",
        "starfield",
        "strings",
        "refresh",
        "tools",
        "onload",
        "span",
        "iframe",
        "found",
        "t1480 execution",
        "backdoor",
        "a domains",
        "russia",
        "next associated",
        "link",
        "windir",
        "interesting",
        "show technique",
        "ck matrix",
        "network traffic",
        "t1071",
        "t1057",
        "lowfi",
        "gameforprofits",
        "game att",
        "night got",
        "job done infected"
      ],
      "references": [
        "DiabloFans ClapBack: Google. Com",
        "Crowdsourced IDS: ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check  Rule Match",
        "CS\u2019d IDS: ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) Rule Match",
        "Crowdsourced IDS: Matches rule SURICATA HTTP missing Host header",
        "Crowdsourced IDS: Unique rule identifier: This rule belongs to a private collection",
        "MetrobyT-mobile",
        "UA Alberta | Somehow I don\u2019t think this is part of a match but rather an attack. Mimic",
        "Unix.Dropper.Mirai inc. 100.181.126.203 \u2022 United States\tAS21928 t-mobile usa inc.",
        "Unix.Dropper.Mirai inc. 1 Korea Telecom 1.107.218.24 \u2022 South Korea\tAS4766",
        "Unix.Dropper.Mirai inc. 1 Telstra Corporation Ltd 1.125.165.62 \u2022 Australia AS1221 Telstra",
        "Unix.Dropper.Mirai inc. 1 Verizon : 100.10.95.119 United States \u2022 AS701 Verizon",
        "Sigma: Matches rule System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Vflooder",
          "display_name": "Trojan:Win32/Vflooder",
          "target": "/malware/Trojan:Win32/Vflooder"
        },
        {
          "id": "Virus.Virlock/Nabucur",
          "display_name": "Virus.Virlock/Nabucur",
          "target": null
        },
        {
          "id": "Win.Virus.PolyRansom-5704625-0",
          "display_name": "Win.Virus.PolyRansom-5704625-0",
          "target": null
        },
        {
          "id": "Unix.Dropper.Mirai-7135870-0",
          "display_name": "Unix.Dropper.Mirai-7135870-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1202",
          "name": "Indirect Command Execution",
          "display_name": "T1202 - Indirect Command Execution"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 450,
        "FileHash-SHA1": 435,
        "FileHash-SHA256": 2092,
        "URL": 646,
        "domain": 593,
        "SSLCertFingerprint": 9,
        "hostname": 657,
        "email": 13
      },
      "indicator_count": 4895,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "174 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d877e28416d81633bae1ad",
      "name": "PolyRansom attack through malicious actor on threat platforms",
      "description": "Virlock , PolyRansom and multiple other attacks through malicious actor using social engineering tactics. Has a rigged platform. Goal -\n to gain complete command and control of users in great platforms. Has infected at least a single device.\n#domainrobot #socialengineeeing  #Tofsee\n#Trojan:Win32/Vflooder\n#Unix.Dropper.Mirai-7135870-0\n#Virus.Virlock/Nabucur\n#Win.Packer.pkr_ce1a-9980177-0\n#Win.Virus.PolyRansom",
      "modified": "2025-10-27T22:02:25.163000",
      "created": "2025-09-27T23:48:50.976000",
      "tags": [
        "iocs",
        "indicator role",
        "write c",
        "intel",
        "ms windows",
        "medium",
        "pe32",
        "delete",
        "ids detections",
        "yara detections",
        "write",
        "malware",
        "delete c",
        "windows",
        "high",
        "port",
        "encrypt",
        "tofsee",
        "stream",
        "passive dns",
        "http",
        "ip address",
        "related nids",
        "files location",
        "united states",
        "united",
        "win32",
        "trojan",
        "mtb may",
        "twitter",
        "hellspawn",
        "worm",
        "title",
        "emails",
        "servers",
        "get http",
        "dns resolutions",
        "http traffic",
        "command",
        "control ta0011",
        "protocol t1071",
        "match info",
        "t1573 severity",
        "info",
        "request",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "response",
        "present sep",
        "aaaa",
        "resolved ips",
        "ip traffic",
        "displayname",
        "yara rule",
        "loaderid",
        "name servers",
        "urls",
        "domain robot",
        "mail",
        "moved",
        "media gmbh",
        "info file",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "manager",
        "shutdown",
        "host",
        "generic http",
        "exe upload",
        "inbound",
        "outbound",
        "markus",
        "certificate",
        "record value",
        "object",
        "path",
        "server",
        "registrar abuse",
        "contact email",
        "contact phone",
        "registrar iana",
        "registrar url",
        "diablo",
        "gandi sas",
        "gandi",
        "diablo attacks",
        "bluemind",
        "alberta",
        "domain add",
        "asn as16625",
        "akamai",
        "less whois",
        "registrar",
        "metrobytmobile",
        "t mobile",
        "metro",
        "present jul",
        "present jun",
        "present aug",
        "germany unknown",
        "germany",
        "invalid url",
        "ipv4 add",
        "frankfurt",
        "main",
        "no entries",
        "entrust",
        "hostname add",
        "files loading",
        "mimic",
        "first address",
        "medium attempts",
        "process",
        "explorer",
        "windows startup",
        "kuwiqsma",
        "match medium",
        "medium installs",
        "installs",
        "t regdword",
        "user",
        "ntcreatefile",
        "filehandle",
        "createfilew",
        "getfilesize",
        "blpdqe",
        "jjqcpluanwwhg",
        "u0012",
        "desiredaccess",
        "keyhandle",
        "ntopenkeyex",
        "u001aw",
        "u0018",
        "read",
        "next",
        "tags none",
        "file type",
        "date september",
        "am size",
        "imphash pehash",
        "richhash",
        "south korea",
        "taiwan as3462",
        "as21928",
        "china as4134",
        "as4766 korea",
        "china as4837",
        "as9318 sk",
        "as701 verizon",
        "verizon",
        "tcp syn",
        "infectednight",
        "resolverror",
        "tref neutral",
        "ck technique",
        "technique id",
        "tofsee high",
        "overview whois",
        "pulses",
        "tags",
        "related tags",
        "more external",
        "resources whois",
        "urlvoid",
        "tavao.exe",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "defense evasion",
        "spawns",
        "access att",
        "ascii text",
        "pattern match",
        "mitre att",
        "size",
        "meta",
        "null",
        "error",
        "click",
        "roboto",
        "hybrid",
        "general",
        "local",
        "starfield",
        "strings",
        "refresh",
        "tools",
        "onload",
        "span",
        "iframe",
        "found",
        "t1480 execution",
        "backdoor",
        "a domains",
        "russia",
        "next associated",
        "link",
        "windir",
        "interesting",
        "show technique",
        "ck matrix",
        "network traffic",
        "t1071",
        "t1057",
        "lowfi",
        "gameforprofits",
        "game att",
        "night got",
        "job done infected"
      ],
      "references": [
        "DiabloFans ClapBack: Google. Com",
        "Crowdsourced IDS: ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check  Rule Match",
        "CS\u2019d IDS: ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) Rule Match",
        "Crowdsourced IDS: Matches rule SURICATA HTTP missing Host header",
        "Crowdsourced IDS: Unique rule identifier: This rule belongs to a private collection",
        "MetrobyT-mobile",
        "UA Alberta | Somehow I don\u2019t think this is part of a match but rather an attack. Mimic",
        "Unix.Dropper.Mirai inc. 100.181.126.203 \u2022 United States\tAS21928 t-mobile usa inc.",
        "Unix.Dropper.Mirai inc. 1 Korea Telecom 1.107.218.24 \u2022 South Korea\tAS4766",
        "Unix.Dropper.Mirai inc. 1 Telstra Corporation Ltd 1.125.165.62 \u2022 Australia AS1221 Telstra",
        "Unix.Dropper.Mirai inc. 1 Verizon : 100.10.95.119 United States \u2022 AS701 Verizon",
        "Sigma: Matches rule System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Vflooder",
          "display_name": "Trojan:Win32/Vflooder",
          "target": "/malware/Trojan:Win32/Vflooder"
        },
        {
          "id": "Virus.Virlock/Nabucur",
          "display_name": "Virus.Virlock/Nabucur",
          "target": null
        },
        {
          "id": "Win.Virus.PolyRansom-5704625-0",
          "display_name": "Win.Virus.PolyRansom-5704625-0",
          "target": null
        },
        {
          "id": "Unix.Dropper.Mirai-7135870-0",
          "display_name": "Unix.Dropper.Mirai-7135870-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1202",
          "name": "Indirect Command Execution",
          "display_name": "T1202 - Indirect Command Execution"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 450,
        "FileHash-SHA1": 435,
        "FileHash-SHA256": 2092,
        "URL": 646,
        "domain": 593,
        "SSLCertFingerprint": 9,
        "hostname": 657,
        "email": 13
      },
      "indicator_count": 4895,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "174 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68cd76f1888c22a2e105e524",
      "name": "Sign in - Google Accounts | Ransomware G3nasom",
      "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
      "modified": "2025-10-19T14:00:01.535000",
      "created": "2025-09-19T15:29:53.126000",
      "tags": [
        "sign",
        "google account",
        "email",
        "forgot email",
        "private window",
        "learn",
        "guest mode",
        "next create",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "owotrus ca",
        "limited",
        "server ca",
        "python",
        "write",
        "trojan",
        "guard",
        "win64",
        "accept",
        "updater",
        "launcher",
        "malware",
        "contacted",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "passive dns",
        "google trust",
        "ip address",
        "related nids",
        "united",
        "url http",
        "present aug",
        "present sep",
        "present jul",
        "unknown aaaa",
        "domain",
        "title",
        "body",
        "trojandropper",
        "mtb sep",
        "meta",
        "next associated",
        "win32upatre sep",
        "backdoor",
        "ipv4",
        "moved",
        "ddos",
        "data upload",
        "extraction",
        "iocs",
        "failed",
        "source url",
        "indicato",
        "mat my",
        "data",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "found",
        "command",
        "initial access",
        "spawns",
        "chrome",
        "gmt content",
        "avast avg",
        "next http",
        "ascii text",
        "size",
        "pattern match",
        "mitre att",
        "error",
        "null",
        "android",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "trident",
        "write c",
        "medium",
        "search",
        "show",
        "high",
        "push",
        "service",
        "ms defender",
        "files matching",
        "number",
        "hide samples",
        "date hash",
        "next yara",
        "emotet",
        "g3nasom",
        "entries",
        "alerts show",
        "ck technique",
        "technique id",
        "io control",
        "anomalous",
        "geofencing",
        "sha256 add",
        "pulse pulses",
        "copy"
      ],
      "references": [
        "http://accounts.google.com/v3/signin/identifier",
        "Yara Detection: Cabinet _Archive",
        "Banking Malware"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/G3nasom",
          "display_name": "ALF:Trojan:Win32/G3nasom",
          "target": null
        },
        {
          "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Backdoor:Win32/Berbew",
          "display_name": "Backdoor:Win32/Berbew",
          "target": "/malware/Backdoor:Win32/Berbew"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.KDS!MTB",
          "display_name": "Trojan:Win32/Emotet.KDS!MTB",
          "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 531,
        "FileHash-SHA256": 1069,
        "URL": 1607,
        "FileHash-MD5": 275,
        "FileHash-SHA1": 187,
        "SSLCertFingerprint": 25,
        "domain": 188,
        "email": 2
      },
      "indicator_count": 3884,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "182 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "kints.ch",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "kints.ch",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776685657.1121788
}