{
  "type": "Domain",
  "indicator": "libcomutil.so",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/libcomutil.so",
    "alexa": "http://www.alexa.com/siteinfo/libcomutil.so",
    "indicator": "libcomutil.so",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3096967959,
      "indicator": "libcomutil.so",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "6975c5cd4db6104ea1a3d69b",
          "name": "The Blender Foundation BouncyCastle-Virut | Malware /Stealer Empty FileHash |  Eternal7  (Shadow Broker) Related",
          "description": "Empty FileHash isn\u2019t benign. Interesting relationships to the Eternal 7. Malware, Stealer and Suspicious History File Operation. BouncyCastle-Virut PublicKeyToken=cc7b13ffcd 2ddd51 1D11.tmp Ultimate-Chicken-Horse- T1O SteamRIP.com.rarys / Startul ErrorPageTemplate[1] netcore, BouncyCastle.",
          "modified": "2026-02-24T06:02:43.853000",
          "created": "2026-01-25T07:27:09.640000",
          "tags": [
            "empty",
            "blender",
            "eurostile",
            "augustin",
            "butterfield",
            "cook",
            "drummer",
            "erickson",
            "fjsv",
            "flynn",
            "gorman",
            "holmes",
            "easy",
            "rada",
            "xanadu",
            "config",
            "reboot",
            "screen",
            "microsoft",
            "commerce server",
            "edition",
            "draw",
            "exchange server",
            "tools",
            "linux",
            "ideal link",
            "nsrl test",
            "nist",
            "file",
            "cultureneutral",
            "fix pack",
            "free download",
            "bouncycastle",
            "read c",
            "search",
            "et trojan",
            "w32kegotip cnc",
            "whitelisted",
            "ids detections",
            "intel",
            "write",
            "trojan",
            "malware",
            "yara detections",
            "productversion",
            "fileversion",
            "av detections",
            "alerts",
            "analysis date",
            "file score",
            "united",
            "aaaa",
            "passive dns",
            "ip address",
            "present dec",
            "body html",
            "head meta",
            "title",
            "urls",
            "url https",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "beacon",
            "et",
            "ipv4",
            "files",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "show",
            "win32virut",
            "destination",
            "port",
            "ms windows",
            "pe32",
            "medium",
            "suspicious",
            "virustotal",
            "startul",
            "shadowbrokers",
            "total",
            "delete",
            "artemis",
            "win32.injector",
            "trendmicro",
            "data upload",
            "extraction",
            "included iocs"
          ],
          "references": [
            "The Blender Foundation",
            "website \u2022 http://oldapps.com/blender.php?old_blender=7584",
            "oldapps \u2022 http://oldapps.com/blender.php?old_blender=7584?download",
            "Google android-cts-7.1_r6-linux_x86-arm.zip",
            "Google android-cts-7.1_r6-linux_x86-arm.zip",
            "android-cts-7.1_r6-linux_x86-arm.zip  [e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855]",
            "Empty FileHash - e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
            "Empty FileHash -Matches rule Suspicious History File Operations by Mikhail Larin, oscd.community",
            "Empty FileHash - Malware,Stealer, Related to ShadowBrokers EternalRocks",
            "ET TROJAN W32/Kegotip CnC Beacon",
            "IDS Detections ET POLICY Suspicious User-Agent Containing .exe",
            "Extensions,.Trojan Age Win Version=4.2.0.168 Win32/1 Culture=neutral, amnit",
            "Virut PublicKeyToken=cc7b13ffcd 2ddd51 1D11.tmp Ultimate-Chicken-Horse- T1O SteamRIP.com.rarys /",
            "Startul ErrorPageTemplate[1] netcore, BouncyCastle.",
            "Secure Protocols: Provides APIs for TLS 1.3, S/MIME, OpenPGP & CMS (Cryptographic Message Syntax)"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BouncyCastle",
              "display_name": "BouncyCastle",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU",
              "display_name": "Sf:ShellCode-AU",
              "target": null
            },
            {
              "id": "Win.Trojan.Fareit-82",
              "display_name": "Win.Trojan.Fareit-82",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-245901",
              "display_name": "Win.Trojan.Agent-245901",
              "target": null
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "W32/Kegotip CnC",
              "display_name": "W32/Kegotip CnC",
              "target": null
            },
            {
              "id": "W32.Virut.ci",
              "display_name": "W32.Virut.ci",
              "target": null
            },
            {
              "id": "Downloader.Generic13.CMTW",
              "display_name": "Downloader.Generic13.CMTW",
              "target": null
            },
            {
              "id": "Downloader.Generic13.BOBZ",
              "display_name": "Downloader.Generic13.BOBZ",
              "target": null
            },
            {
              "id": "Win.Trojan.Injector-12138",
              "display_name": "Win.Trojan.Injector-12138",
              "target": null
            },
            {
              "id": "Generic36.ADTY",
              "display_name": "Generic36.ADTY",
              "target": null
            },
            {
              "id": "Generic36.AIAA.Dropper",
              "display_name": "Generic36.AIAA.Dropper",
              "target": null
            },
            {
              "id": "Generic36.AJSM",
              "display_name": "Generic36.AJSM",
              "target": null
            },
            {
              "id": "Win32/Virut",
              "display_name": "Win32/Virut",
              "target": null
            },
            {
              "id": "Win32/Ramnit.A",
              "display_name": "Win32/Ramnit.A",
              "target": null
            },
            {
              "id": "Worm.Autorun-6180",
              "display_name": "Worm.Autorun-6180",
              "target": null
            },
            {
              "id": "Hider.BIY",
              "display_name": "Hider.BIY",
              "target": null
            },
            {
              "id": "Win.Trojan.Rootkit-4532",
              "display_name": "Win.Trojan.Rootkit-4532",
              "target": null
            },
            {
              "id": "Win32/Blacked",
              "display_name": "Win32/Blacked",
              "target": null
            },
            {
              "id": "Win32.Injector",
              "display_name": "Win32.Injector",
              "target": null
            },
            {
              "id": "TrendMicro",
              "display_name": "TrendMicro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 71,
            "FileHash-SHA256": 853,
            "URL": 1639,
            "domain": 288,
            "FileHash-MD5": 78,
            "hostname": 545
          },
          "indicator_count": 3474,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "54 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6665c84b687c5e16b95e8f8e",
          "name": "94.152.152.223  v65023.niebieski.net  Cyber_Folks S.A.  (vgt.pl)",
          "description": "SHA1  32223ade25c4a1d39cb8ac13042e8e6dfe3ca78f ,  SHA1 \n 99987c1ee1ddb7fd113abd65c836fbb71c3da4da\n Role:  UPX , Ransomware , Trojan ,  Mirai , Buschido Mirai  antywirusowe\nWin.Trojan.VBGeneric-6735875-0 , Robak:Win32/Mofksys.RND!MTB",
          "modified": "2024-12-31T01:53:43.222000",
          "created": "2024-06-09T15:20:43.178000",
          "tags": [
            "expiration",
            "no expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "ipv4",
            "filehashsha256",
            "fh no",
            "filehashmd5",
            "https odcisk",
            "palca jarma",
            "https dane",
            "v3 numer",
            "odcisk palca",
            "pl o",
            "unizeto",
            "sa ou",
            "urzd",
            "certum cn"
          ],
          "references": [
            "https://viz.greynoise.io/analysis/f3d70a4f-14b1-4d26-8617-98d591",
            "https://viz.greynoise.io/analysis/a40cf3ce-d048-47c1-94b7-730b71",
            "https://viz.greynoise.io/analysis/4627bc3a-0238-4f2f-ad5c-c50527"
          ],
          "public": 1,
          "adversary": "TrojanDownloader:Win32/Nemucod",
          "targeted_countries": [
            "Poland",
            "United States of America",
            "Germany",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "Serwer A Przed\u0142u\u017cenie sesji #{text} Wojcieszyce  PL",
              "display_name": "Serwer A Przed\u0142u\u017cenie sesji #{text} Wojcieszyce  PL",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1027.004",
              "name": "Compile After Delivery",
              "display_name": "T1027.004 - Compile After Delivery"
            },
            {
              "id": "T1027.003",
              "name": "Steganography",
              "display_name": "T1027.003 - Steganography"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1027.001",
              "name": "Binary Padding",
              "display_name": "T1027.001 - Binary Padding"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1059.003",
              "name": "Windows Command Shell",
              "display_name": "T1059.003 - Windows Command Shell"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1553.006",
              "name": "Code Signing Policy Modification",
              "display_name": "T1553.006 - Code Signing Policy Modification"
            },
            {
              "id": "T1553.004",
              "name": "Install Root Certificate",
              "display_name": "T1553.004 - Install Root Certificate"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566.001",
              "name": "Spearphishing Attachment",
              "display_name": "T1566.001 - Spearphishing Attachment"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1036.001",
              "name": "Invalid Code Signature",
              "display_name": "T1036.001 - Invalid Code Signature"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 3205,
            "FileHash-SHA1": 2671,
            "FileHash-SHA256": 11469,
            "SSLCertFingerprint": 6,
            "URL": 5435,
            "domain": 1356,
            "email": 55,
            "hostname": 2205,
            "CVE": 13,
            "YARA": 4,
            "CIDR": 1,
            "IPv4": 25,
            "FileHash-IMPHASH": 1,
            "BitcoinAddress": 2,
            "IPv6": 13
          },
          "indicator_count": 26461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "474 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d147ac5afafb76f652ccfb",
          "name": "cyberfolks.pl / Hosting/ 185.208.164.121 / VPS / 94.152.11.60 / 193.218.154.51",
          "description": "The full text of the text-free version of Microsoft's Chrome browser can be viewed here:. \u00c2\u00a31.5m.. (\u20ac2.4m)  \u20ac",
          "modified": "2024-12-16T22:19:24.841000",
          "created": "2024-08-30T04:16:44.939000",
          "tags": [
            "vhash",
            "ssdeep",
            "digicert",
            "g2 firmy",
            "digicert g3",
            "entrust gwny",
            "gwny",
            "microsoft ecc",
            "microsoft azure",
            "ecc tls",
            "rsa tls",
            "microsoft rsa",
            "aoc ca",
            "digicert tls",
            "azure rsa",
            "eoc ca",
            "digicert cloud",
            "azure tls",
            "azure ecc",
            "xargs",
            "jeli",
            "azure",
            "authority",
            "java",
            "ms windows",
            "dziennik zdarze",
            "vista",
            "pe32",
            "intel",
            "defender",
            "systemy",
            "plik",
            "tekst ascii",
            "dane archiwalne",
            "ptime",
            "danie",
            "msie",
            "windows nt",
            "okrndata",
            "jzyk",
            "cieka",
            "sha1",
            "sha256",
            "imphasz",
            "pejzasz",
            "windows",
            "eurostile",
            "disk1",
            "augustin",
            "butterfield",
            "cook",
            "drummer",
            "erickson",
            "fjsv",
            "flynn",
            "gorman",
            "easy",
            "rada",
            "xanadu",
            "config",
            "reboot",
            "screen",
            "trash",
            "wersja pliku",
            "v2 dokument",
            "aaaa",
            "cname",
            "aaaaa",
            "whasz",
            "dostawa",
            "cache entry",
            "wav chrome",
            "gzip chrome",
            "text chrome",
            "woff chrome",
            "cab c",
            "lnk c",
            "doc c",
            "doc chrome",
            "ttf chrome"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6307,
            "hostname": 7851,
            "domain": 1282,
            "FileHash-MD5": 221,
            "FileHash-SHA256": 1346,
            "IPv4": 1437,
            "IPv6": 8,
            "FileHash-SHA1": 192,
            "email": 3,
            "CIDR": 8,
            "CVE": 2
          },
          "indicator_count": 18657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 125,
          "modified_text": "489 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Virut PublicKeyToken=cc7b13ffcd 2ddd51 1D11.tmp Ultimate-Chicken-Horse- T1O SteamRIP.com.rarys /",
        "oldapps \u2022 http://oldapps.com/blender.php?old_blender=7584?download",
        "IDS Detections ET POLICY Suspicious User-Agent Containing .exe",
        "https://viz.greynoise.io/analysis/4627bc3a-0238-4f2f-ad5c-c50527",
        "The Blender Foundation",
        "Empty FileHash - e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "Empty FileHash - Malware,Stealer, Related to ShadowBrokers EternalRocks",
        "Startul ErrorPageTemplate[1] netcore, BouncyCastle.",
        "Extensions,.Trojan Age Win Version=4.2.0.168 Win32/1 Culture=neutral, amnit",
        "website \u2022 http://oldapps.com/blender.php?old_blender=7584",
        "android-cts-7.1_r6-linux_x86-arm.zip  [e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855]",
        "ET TROJAN W32/Kegotip CnC Beacon",
        "https://viz.greynoise.io/analysis/f3d70a4f-14b1-4d26-8617-98d591",
        "https://viz.greynoise.io/analysis/a40cf3ce-d048-47c1-94b7-730b71",
        "Google android-cts-7.1_r6-linux_x86-arm.zip",
        "Secure Protocols: Provides APIs for TLS 1.3, S/MIME, OpenPGP & CMS (Cryptographic Message Syntax)",
        "Empty FileHash -Matches rule Suspicious History File Operations by Mikhail Larin, oscd.community"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "TrojanDownloader:Win32/Nemucod"
          ],
          "malware_families": [
            "Sf:shellcode-au",
            "Win.trojan.fareit-82",
            "Win32/blacked",
            "#lowfienabledtcontinueafterunpacking",
            "Win.trojan.rootkit-4532",
            "Worm.autorun-6180",
            "Win32.injector",
            "Generic36.adty",
            "Trendmicro",
            "Et",
            "Generic36.aiaa.dropper",
            "Downloader.generic13.cmtw",
            "Generic36.ajsm",
            "Win32/ramnit.a",
            "Serwer a przed\u0142u\u017cenie sesji #{text} wojcieszyce  pl",
            "Win.trojan.agent-245901",
            "Win.trojan.injector-12138",
            "Bouncycastle",
            "W32.virut.ci",
            "W32/kegotip cnc",
            "Hider.biy",
            "Win32/virut",
            "Downloader.generic13.bobz"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "6975c5cd4db6104ea1a3d69b",
      "name": "The Blender Foundation BouncyCastle-Virut | Malware /Stealer Empty FileHash |  Eternal7  (Shadow Broker) Related",
      "description": "Empty FileHash isn\u2019t benign. Interesting relationships to the Eternal 7. Malware, Stealer and Suspicious History File Operation. BouncyCastle-Virut PublicKeyToken=cc7b13ffcd 2ddd51 1D11.tmp Ultimate-Chicken-Horse- T1O SteamRIP.com.rarys / Startul ErrorPageTemplate[1] netcore, BouncyCastle.",
      "modified": "2026-02-24T06:02:43.853000",
      "created": "2026-01-25T07:27:09.640000",
      "tags": [
        "empty",
        "blender",
        "eurostile",
        "augustin",
        "butterfield",
        "cook",
        "drummer",
        "erickson",
        "fjsv",
        "flynn",
        "gorman",
        "holmes",
        "easy",
        "rada",
        "xanadu",
        "config",
        "reboot",
        "screen",
        "microsoft",
        "commerce server",
        "edition",
        "draw",
        "exchange server",
        "tools",
        "linux",
        "ideal link",
        "nsrl test",
        "nist",
        "file",
        "cultureneutral",
        "fix pack",
        "free download",
        "bouncycastle",
        "read c",
        "search",
        "et trojan",
        "w32kegotip cnc",
        "whitelisted",
        "ids detections",
        "intel",
        "write",
        "trojan",
        "malware",
        "yara detections",
        "productversion",
        "fileversion",
        "av detections",
        "alerts",
        "analysis date",
        "file score",
        "united",
        "aaaa",
        "passive dns",
        "ip address",
        "present dec",
        "body html",
        "head meta",
        "title",
        "urls",
        "url https",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "beacon",
        "et",
        "ipv4",
        "files",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "related pulses",
        "show",
        "win32virut",
        "destination",
        "port",
        "ms windows",
        "pe32",
        "medium",
        "suspicious",
        "virustotal",
        "startul",
        "shadowbrokers",
        "total",
        "delete",
        "artemis",
        "win32.injector",
        "trendmicro",
        "data upload",
        "extraction",
        "included iocs"
      ],
      "references": [
        "The Blender Foundation",
        "website \u2022 http://oldapps.com/blender.php?old_blender=7584",
        "oldapps \u2022 http://oldapps.com/blender.php?old_blender=7584?download",
        "Google android-cts-7.1_r6-linux_x86-arm.zip",
        "Google android-cts-7.1_r6-linux_x86-arm.zip",
        "android-cts-7.1_r6-linux_x86-arm.zip  [e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855]",
        "Empty FileHash - e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "Empty FileHash -Matches rule Suspicious History File Operations by Mikhail Larin, oscd.community",
        "Empty FileHash - Malware,Stealer, Related to ShadowBrokers EternalRocks",
        "ET TROJAN W32/Kegotip CnC Beacon",
        "IDS Detections ET POLICY Suspicious User-Agent Containing .exe",
        "Extensions,.Trojan Age Win Version=4.2.0.168 Win32/1 Culture=neutral, amnit",
        "Virut PublicKeyToken=cc7b13ffcd 2ddd51 1D11.tmp Ultimate-Chicken-Horse- T1O SteamRIP.com.rarys /",
        "Startul ErrorPageTemplate[1] netcore, BouncyCastle.",
        "Secure Protocols: Provides APIs for TLS 1.3, S/MIME, OpenPGP & CMS (Cryptographic Message Syntax)"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "BouncyCastle",
          "display_name": "BouncyCastle",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU",
          "display_name": "Sf:ShellCode-AU",
          "target": null
        },
        {
          "id": "Win.Trojan.Fareit-82",
          "display_name": "Win.Trojan.Fareit-82",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-245901",
          "display_name": "Win.Trojan.Agent-245901",
          "target": null
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "W32/Kegotip CnC",
          "display_name": "W32/Kegotip CnC",
          "target": null
        },
        {
          "id": "W32.Virut.ci",
          "display_name": "W32.Virut.ci",
          "target": null
        },
        {
          "id": "Downloader.Generic13.CMTW",
          "display_name": "Downloader.Generic13.CMTW",
          "target": null
        },
        {
          "id": "Downloader.Generic13.BOBZ",
          "display_name": "Downloader.Generic13.BOBZ",
          "target": null
        },
        {
          "id": "Win.Trojan.Injector-12138",
          "display_name": "Win.Trojan.Injector-12138",
          "target": null
        },
        {
          "id": "Generic36.ADTY",
          "display_name": "Generic36.ADTY",
          "target": null
        },
        {
          "id": "Generic36.AIAA.Dropper",
          "display_name": "Generic36.AIAA.Dropper",
          "target": null
        },
        {
          "id": "Generic36.AJSM",
          "display_name": "Generic36.AJSM",
          "target": null
        },
        {
          "id": "Win32/Virut",
          "display_name": "Win32/Virut",
          "target": null
        },
        {
          "id": "Win32/Ramnit.A",
          "display_name": "Win32/Ramnit.A",
          "target": null
        },
        {
          "id": "Worm.Autorun-6180",
          "display_name": "Worm.Autorun-6180",
          "target": null
        },
        {
          "id": "Hider.BIY",
          "display_name": "Hider.BIY",
          "target": null
        },
        {
          "id": "Win.Trojan.Rootkit-4532",
          "display_name": "Win.Trojan.Rootkit-4532",
          "target": null
        },
        {
          "id": "Win32/Blacked",
          "display_name": "Win32/Blacked",
          "target": null
        },
        {
          "id": "Win32.Injector",
          "display_name": "Win32.Injector",
          "target": null
        },
        {
          "id": "TrendMicro",
          "display_name": "TrendMicro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 71,
        "FileHash-SHA256": 853,
        "URL": 1639,
        "domain": 288,
        "FileHash-MD5": 78,
        "hostname": 545
      },
      "indicator_count": 3474,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "54 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6665c84b687c5e16b95e8f8e",
      "name": "94.152.152.223  v65023.niebieski.net  Cyber_Folks S.A.  (vgt.pl)",
      "description": "SHA1  32223ade25c4a1d39cb8ac13042e8e6dfe3ca78f ,  SHA1 \n 99987c1ee1ddb7fd113abd65c836fbb71c3da4da\n Role:  UPX , Ransomware , Trojan ,  Mirai , Buschido Mirai  antywirusowe\nWin.Trojan.VBGeneric-6735875-0 , Robak:Win32/Mofksys.RND!MTB",
      "modified": "2024-12-31T01:53:43.222000",
      "created": "2024-06-09T15:20:43.178000",
      "tags": [
        "expiration",
        "no expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "ipv4",
        "filehashsha256",
        "fh no",
        "filehashmd5",
        "https odcisk",
        "palca jarma",
        "https dane",
        "v3 numer",
        "odcisk palca",
        "pl o",
        "unizeto",
        "sa ou",
        "urzd",
        "certum cn"
      ],
      "references": [
        "https://viz.greynoise.io/analysis/f3d70a4f-14b1-4d26-8617-98d591",
        "https://viz.greynoise.io/analysis/a40cf3ce-d048-47c1-94b7-730b71",
        "https://viz.greynoise.io/analysis/4627bc3a-0238-4f2f-ad5c-c50527"
      ],
      "public": 1,
      "adversary": "TrojanDownloader:Win32/Nemucod",
      "targeted_countries": [
        "Poland",
        "United States of America",
        "Germany",
        "Netherlands"
      ],
      "malware_families": [
        {
          "id": "Serwer A Przed\u0142u\u017cenie sesji #{text} Wojcieszyce  PL",
          "display_name": "Serwer A Przed\u0142u\u017cenie sesji #{text} Wojcieszyce  PL",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1027.004",
          "name": "Compile After Delivery",
          "display_name": "T1027.004 - Compile After Delivery"
        },
        {
          "id": "T1027.003",
          "name": "Steganography",
          "display_name": "T1027.003 - Steganography"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1027.001",
          "name": "Binary Padding",
          "display_name": "T1027.001 - Binary Padding"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1059.003",
          "name": "Windows Command Shell",
          "display_name": "T1059.003 - Windows Command Shell"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1553.006",
          "name": "Code Signing Policy Modification",
          "display_name": "T1553.006 - Code Signing Policy Modification"
        },
        {
          "id": "T1553.004",
          "name": "Install Root Certificate",
          "display_name": "T1553.004 - Install Root Certificate"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566.001",
          "name": "Spearphishing Attachment",
          "display_name": "T1566.001 - Spearphishing Attachment"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1036.001",
          "name": "Invalid Code Signature",
          "display_name": "T1036.001 - Invalid Code Signature"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 3205,
        "FileHash-SHA1": 2671,
        "FileHash-SHA256": 11469,
        "SSLCertFingerprint": 6,
        "URL": 5435,
        "domain": 1356,
        "email": 55,
        "hostname": 2205,
        "CVE": 13,
        "YARA": 4,
        "CIDR": 1,
        "IPv4": 25,
        "FileHash-IMPHASH": 1,
        "BitcoinAddress": 2,
        "IPv6": 13
      },
      "indicator_count": 26461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "474 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d147ac5afafb76f652ccfb",
      "name": "cyberfolks.pl / Hosting/ 185.208.164.121 / VPS / 94.152.11.60 / 193.218.154.51",
      "description": "The full text of the text-free version of Microsoft's Chrome browser can be viewed here:. \u00c2\u00a31.5m.. (\u20ac2.4m)  \u20ac",
      "modified": "2024-12-16T22:19:24.841000",
      "created": "2024-08-30T04:16:44.939000",
      "tags": [
        "vhash",
        "ssdeep",
        "digicert",
        "g2 firmy",
        "digicert g3",
        "entrust gwny",
        "gwny",
        "microsoft ecc",
        "microsoft azure",
        "ecc tls",
        "rsa tls",
        "microsoft rsa",
        "aoc ca",
        "digicert tls",
        "azure rsa",
        "eoc ca",
        "digicert cloud",
        "azure tls",
        "azure ecc",
        "xargs",
        "jeli",
        "azure",
        "authority",
        "java",
        "ms windows",
        "dziennik zdarze",
        "vista",
        "pe32",
        "intel",
        "defender",
        "systemy",
        "plik",
        "tekst ascii",
        "dane archiwalne",
        "ptime",
        "danie",
        "msie",
        "windows nt",
        "okrndata",
        "jzyk",
        "cieka",
        "sha1",
        "sha256",
        "imphasz",
        "pejzasz",
        "windows",
        "eurostile",
        "disk1",
        "augustin",
        "butterfield",
        "cook",
        "drummer",
        "erickson",
        "fjsv",
        "flynn",
        "gorman",
        "easy",
        "rada",
        "xanadu",
        "config",
        "reboot",
        "screen",
        "trash",
        "wersja pliku",
        "v2 dokument",
        "aaaa",
        "cname",
        "aaaaa",
        "whasz",
        "dostawa",
        "cache entry",
        "wav chrome",
        "gzip chrome",
        "text chrome",
        "woff chrome",
        "cab c",
        "lnk c",
        "doc c",
        "doc chrome",
        "ttf chrome"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6307,
        "hostname": 7851,
        "domain": 1282,
        "FileHash-MD5": 221,
        "FileHash-SHA256": 1346,
        "IPv4": 1437,
        "IPv6": 8,
        "FileHash-SHA1": 192,
        "email": 3,
        "CIDR": 8,
        "CVE": 2
      },
      "indicator_count": 18657,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 125,
      "modified_text": "489 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "libcomutil.so",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "libcomutil.so",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641717.2844667
}