{
  "type": "Domain",
  "indicator": "lostwebtracker.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/lostwebtracker.com",
    "alexa": "http://www.alexa.com/siteinfo/lostwebtracker.com",
    "indicator": "lostwebtracker.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 143056267,
      "indicator": "lostwebtracker.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 21,
      "pulses": [
        {
          "id": "69aa0a62f94a92b5168405c2",
          "name": "fedpaypal clone Q vashti",
          "description": "",
          "modified": "2026-03-06T06:39:27.872000",
          "created": "2026-03-05T22:57:38.559000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68c5743593a4bcc81dd94b0b",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1323,
            "URL": 4360,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "44 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c5743593a4bcc81dd94b0b",
          "name": "Fed.PayPal.com - Ransom | Attacks via redirect",
          "description": "A monitored target, active on various payment platforms for business documented a malicious redirect event 1st seen in 2020. Follows pattern of multiple, critical and ongoing attacks beginning in 2013. In this instance target lost access to PayPal payments. If this is legal, it\u2019s been a grotesque grift. Target was financially and otherwise robbed.\n\n\n#trulymissed #paypal #advesaries #apple #twitter #backdoor #ransom #botnet #reptutationattack",
          "modified": "2025-10-13T13:27:11.277000",
          "created": "2025-09-13T13:40:05.671000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1321,
            "URL": 4356,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13415,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "188 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "686df81130f94fff809dd8b7",
          "name": "T-Mobile Service- 23.185.0.2 - Mirai",
          "description": "",
          "modified": "2025-08-08T04:05:03.809000",
          "created": "2025-07-09T05:03:13.536000",
          "tags": [
            "germany unknown",
            "passive dns",
            "invalid url",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "frankfurt",
            "main",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr11",
            "validity",
            "public key",
            "info",
            "south korea",
            "united",
            "taiwan as3462",
            "as21928",
            "china as4134",
            "as4766 korea",
            "china as4837",
            "as9318 sk",
            "high",
            "as701 verizon",
            "malware",
            "copy",
            "name jim",
            "zemlin name",
            "letterman dr",
            "address bldg",
            "d ste",
            "date",
            "dnssec",
            "record value",
            "emails",
            "address",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results jul",
            "present jul",
            "present showing",
            "entries related",
            "domains show",
            "present jun",
            "search",
            "enom",
            "creation date",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 178,
            "FileHash-SHA1": 180,
            "FileHash-SHA256": 2435,
            "hostname": 644,
            "domain": 603,
            "URL": 585,
            "email": 3
          },
          "indicator_count": 4628,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "254 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e6547f22d43d6d149cac7a",
          "name": "RedCap Abuse | The 1st Pulse was deleted from OTX . AlienVault",
          "description": "Another example of target working with a hacker impersonating some7he.sje was not. The hackers had the perfect opportunity to stay attached to Dropbox, photos. microphone and highlighted heavily targets location. || Target was suspicious about several issues related to pair. Hacker has only one piece of equipment for project. Target basically had to give him all , tips, cues and direction for project. If this Pulse is deleted I don't know what to think.",
          "modified": "2024-10-15T02:02:53.504000",
          "created": "2024-09-15T03:29:03.699000",
          "tags": [
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "ip address",
            "related nids",
            "code",
            "process32nextw",
            "intel",
            "ms windows",
            "united",
            "pe32",
            "search",
            "module load",
            "t1129",
            "read c",
            "default",
            "path",
            "write",
            "malware",
            "copy",
            "win32",
            "suspicious",
            "unknown",
            "united kingdom",
            "set cookie",
            "as43350 nforce",
            "script urls",
            "as55286",
            "status",
            "cookie",
            "trojan",
            "template",
            "showing",
            "entries",
            "body",
            "ransom",
            "meta",
            "a div",
            "div div",
            "ipv4",
            "script script",
            "as16276",
            "france unknown",
            "link",
            "span a",
            "span span",
            "span",
            "class",
            "pragma",
            "servers",
            "creation date",
            "emails",
            "domain",
            "expiration date",
            "cname",
            "aaaa",
            "certificate",
            "lowfitrojan",
            "hstr",
            "jsauto25 jun",
            "pm lowfitrojan",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "endpoints all",
            "trojan features",
            "date hash",
            "as15169 google",
            "as44273 host",
            "september",
            "de indicators",
            "domains",
            "hashes",
            "dynamicloader",
            "yara detections",
            "enigmaprotector",
            "high",
            "bios",
            "dynamic",
            "filehash",
            "yaxpax",
            "yapaxi",
            "zp6axi0",
            "cuckoo",
            "name servers",
            "domains ii",
            "for privacy",
            "redacted for",
            "next",
            "domain address",
            "alienvault name",
            "server",
            "flag",
            "contacted hosts",
            "process details",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "exit node",
            "traffic group",
            "suricata",
            "overview ip",
            "address",
            "files location",
            "flag united",
            "hostname",
            "files domain",
            "months ago",
            "created",
            "email",
            "modified",
            "filehashsha1",
            "filehashsha256",
            "white cve",
            "cyber",
            "xamzexpires300",
            "twitter",
            "xor ddos",
            "xorddos",
            "hacktool",
            "bazaarloader",
            "redcap",
            "formbook",
            "locky",
            "lockbit",
            "ransomware",
            "target",
            "ebury",
            "virustotal",
            "crypter",
            "shadowpad",
            "corrupt",
            "cryptor",
            "android",
            "xrat",
            "xtrat",
            "malicious",
            "honeypot",
            "fraud",
            "already",
            "behav",
            "ragnar locker",
            "swipper",
            "n\u2205 ip",
            "write c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "delete c",
            "execution",
            "dock",
            "persistence",
            "august",
            "asnone bulgaria",
            "sales",
            "algorithm",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "whois lookups",
            "dnssec",
            "domain name",
            "abuse contact",
            "registrar abuse",
            "contact phone",
            "registrar iana",
            "date",
            "dns replication",
            "record type",
            "ttl value",
            "msms33388520",
            "data",
            "cus starizona",
            "cngo daddy",
            "authority",
            "g2 validity"
          ],
          "references": [
            "TrojanSpy:Win32/Nivdort.DE",
            "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
            "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
            "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
            "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
            "Alerts: nids_malware_alert network_icmp persistence_autorun"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_ade36583",
              "display_name": "ALF:Trojan:Win32/Cassini_ade36583",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
              "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
              "target": null
            },
            {
              "id": "Ransom:Win32/Wannaren",
              "display_name": "Ransom:Win32/Wannaren",
              "target": "/malware/Ransom:Win32/Wannaren"
            },
            {
              "id": "#LowfiTrojan:JS/Auto25",
              "display_name": "#LowfiTrojan:JS/Auto25",
              "target": "/malware/#LowfiTrojan:JS/Auto25"
            },
            {
              "id": "Trojan:Win32/Startpage",
              "display_name": "Trojan:Win32/Startpage",
              "target": "/malware/Trojan:Win32/Startpage"
            },
            {
              "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
              "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
              "target": null
            },
            {
              "id": "Win.Packed.XtremeRAT-9837419-0",
              "display_name": "Win.Packed.XtremeRAT-9837419-0",
              "target": null
            },
            {
              "id": "Win.Packed.Kelios-10023944-0",
              "display_name": "Win.Packed.Kelios-10023944-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Unruy-5885",
              "display_name": "Win.Trojan.Unruy-5885",
              "target": null
            },
            {
              "id": "Ebury",
              "display_name": "Ebury",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Swipper",
              "display_name": "Swipper",
              "target": null
            },
            {
              "id": "N\u2205 IP",
              "display_name": "N\u2205 IP",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.DE",
              "display_name": "TrojanSpy:Win32/Nivdort.DE",
              "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [
            "Government",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4315,
            "FileHash-MD5": 573,
            "FileHash-SHA1": 550,
            "FileHash-SHA256": 4114,
            "domain": 4757,
            "hostname": 2075,
            "SSLCertFingerprint": 5,
            "email": 14,
            "CIDR": 1
          },
          "indicator_count": 16404,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66db032984e6013ddf6c58cf",
          "name": "internet.bs",
          "description": "",
          "modified": "2024-09-06T13:27:05.152000",
          "created": "2024-09-06T13:27:05.152000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 101
          },
          "indicator_count": 101,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 177,
          "modified_text": "590 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d6df9d36bac14ccd87",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:06.808000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8134,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "776 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d257bb241c4fa3f68d",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:02.291000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "776 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0cf9b0dac1aa7f9046cf",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:28:25.092000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0d302007152543202bac",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:29:20.375000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 310,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0d2518a7ef9bb17df1b9",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:29:09.832000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc0cfda433eb05bde3827b",
          "name": "WannaCry",
          "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
          "modified": "2024-03-02T21:02:32.756000",
          "created": "2024-02-01T21:28:29.606000",
          "tags": [
            "contacted",
            "tsara brashears",
            "urls url",
            "files",
            "pegasus",
            "domains",
            "cellbrite",
            "targets sa",
            "survivor",
            "apple ios",
            "execution",
            "lockbit",
            "malware",
            "core",
            "awful",
            "hacktool",
            "crypto",
            "ransomexx",
            "quasar",
            "asyncrat",
            "bot network",
            "loader",
            "ransomware",
            "wannacry",
            "cryptor",
            "encoder",
            "compiler",
            "win32 dll",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "vs98",
            "contained",
            "w english",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "language",
            "overlay",
            "as133618",
            "unknown",
            "cname",
            "united",
            "germany unknown",
            "ukraine unknown",
            "ireland unknown",
            "virgin islands",
            "as47846",
            "as39084 rinet",
            "date",
            "encrypt",
            "next",
            "microsoft visual c++ v6.0",
            "as133618 trellian pty. limited",
            "dynamicloader",
            "high",
            "t1063",
            "yara rule",
            "medium",
            "spoofs",
            "high security",
            "software",
            "discovery",
            "attempts",
            "april",
            "dropper",
            "reads self",
            "bots",
            "connect",
            "botnet",
            "sabey",
            "libel",
            "menacing",
            "brother sabey",
            "as15169 google",
            "aaaa",
            "search",
            "name servers",
            "as29182 jsc",
            "russia unknown",
            "found",
            "error"
          ],
          "references": [
            "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
            "cellebrite.com | enterprise.cellebrite.com",
            "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
            "deviceinbox.com",
            "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
            "c1a99e3bde9bad27e463c32b96311312.virus",
            "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
            "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
            "CS IDS rule: (port_scan) TCP filtered portsweep",
            "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
            "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
            "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
            "Trojan:Win32/WannaCry.350",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
            "angebot.staude.de",
            "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
            "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
            "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
          ],
          "public": 1,
          "adversary": "NSO Group - Pegasus",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/WannaCry.350",
              "display_name": "Trojan:Win32/WannaCry.350",
              "target": "/malware/Trojan:Win32/WannaCry.350"
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 67,
            "FileHash-SHA1": 62,
            "FileHash-SHA256": 2864,
            "domain": 1401,
            "URL": 5523,
            "hostname": 1766,
            "FilePath": 1,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 11691,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65618963e4e45d0c53f8e770",
          "name": "ww1.imobitracking.net",
          "description": "critical, cronup threat, cyber threat, data, serious, tracking, emails collection, relay router , emotet, exploit, content reputation.\n\nSerious tracking efforts, malicious.",
          "modified": "2023-12-25T03:01:27.395000",
          "created": "2023-11-25T05:42:59.043000",
          "tags": [
            "creation date",
            "search",
            "passive dns",
            "urls",
            "address",
            "record value",
            "emails",
            "date",
            "showing",
            "body",
            "unknown",
            "cowboy",
            "encrypt",
            "resolver ip",
            "whois lookups",
            "server",
            "iana id",
            "registrar abuse",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "registrar",
            "first",
            "dns replication",
            "algorithm",
            "key usage",
            "google",
            "record type",
            "ttl value",
            "cname",
            "data",
            "v3 serial",
            "contacted",
            "ssl certificate",
            "threat roundup",
            "march",
            "august",
            "referrer",
            "whois record",
            "communicating",
            "june",
            "april",
            "copy",
            "february",
            "cobalt strike",
            "remcos",
            "emotet",
            "core",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "internet storm",
            "united",
            "cyber threat",
            "heur",
            "malicious url",
            "mail spammer",
            "suppobox",
            "bambernek",
            "cronup threat",
            "team",
            "facebook",
            "malicious",
            "phishing",
            "download",
            "virut",
            "unruy",
            "bandoo",
            "matsnu",
            "tofsee",
            "simda",
            "vawtrak",
            "hotmail",
            "qakbot",
            "asyncrat",
            "tsara brashears",
            "no data",
            "count blacklist",
            "tag tag",
            "pattern match",
            "ascii text",
            "file",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "appdata",
            "path",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "tor known",
            "tor relayrouter",
            "node tcp",
            "traffic",
            "host",
            "cins active",
            "poor reputation",
            "spammer",
            "barracuda et",
            "artemis",
            "iframe",
            "cleaner",
            "unsafe",
            "riskware",
            "agent",
            "wacatac",
            "bank",
            "opencandy",
            "nircmd",
            "swrort",
            "downldr",
            "crack",
            "presenoker",
            "filetour",
            "conduit",
            "xtrat",
            "azorult",
            "service",
            "runescape",
            "acint",
            "systweak",
            "behav",
            "tiggre",
            "genkryptik",
            "exploit",
            "xrat",
            "installcore",
            "patcher",
            "adload",
            "win64",
            "softcnapp",
            "union",
            "ponmocup",
            "fusioncore",
            "trojanspy",
            "webtoolbar",
            "maltiverse",
            "114.114.114.114",
            "tulach",
            "tracking",
            "apple",
            "illegal",
            "target",
            "c2",
            "cnc",
            "scanning_host",
            "CVE-2011-0611",
            "CVE-2017-0147",
            "CVE-2014-3153",
            "CVE-2016-0189",
            "CVE-2017-0199",
            "CVE-2017-8570",
            "CVE-2017-11882",
            "CVE-2018-4893",
            "CVE-2018-8174",
            "CVE-2020-0601",
            "CVE-2023-22518"
          ],
          "references": [
            "ww1.imobitracking.net",
            "https://www.hybrid-analysis.com/sample/dcf9f5e78d4645b38540d25c4d8ca7fe3e019671caadf7cade4cc01008282bff",
            "114.114.114.114",
            "signin-appleid.jackpotiot.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "http://manage.apple.com.webobjectsd5dbc98dcc983a7028bd82d1a47540.dsiblings.com/Info/information.html",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://httpdev.findatoyota.com",
            "https://secure.medicalexpo.com/request-management-ws/views/contact-details.xhtml?token=A3QIgyaKRur%2BIjZfA4R8MkKBwXLdgMI5Gg%2F0dwmuMj0",
            "t.prototype.hasownproperty.call",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://trkr.similarphotocleaner.com/trackerwcfsrv/tracker.svc/trackoffersview/?q=pxl=mco2191_mco2146_mco1132&utm_source=mcosfl&utm_medium=mcosfl&utm_campaign=mcosfl&x-count=1&x-context=osversion-5.1"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Private Internet Access",
              "display_name": "Private Internet Access",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "XRat",
              "display_name": "XRat",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Bandoo",
              "display_name": "Bandoo",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Vawtrak",
              "display_name": "Vawtrak",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Ponmocup",
              "display_name": "TrojanDropper:Win32/Ponmocup",
              "target": "/malware/TrojanDropper:Win32/Ponmocup"
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1569,
            "FileHash-MD5": 489,
            "URL": 7420,
            "domain": 917,
            "FileHash-SHA1": 247,
            "email": 3,
            "FileHash-SHA256": 2578,
            "CVE": 11
          },
          "indicator_count": 13234,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6561581c55aacc7f571968af",
          "name": "Mirai | Inmortal | Loki | SpyEye",
          "description": "attack, cyber threat, network, vehicle tracking, cnc, athena cyber stalking, betabot, social engineering, Cisco umbrella, bambernek simda, active threat, ongoing spreader, spyware, redline stealer, qakbot, anilise, milemighmedia, sweetheart videos botnetwork, targeting ,  redirects, network, targeted toyota tracking",
          "modified": "2023-12-25T01:00:05.300000",
          "created": "2023-11-25T02:12:44.278000",
          "tags": [
            "replication",
            "date",
            "graph summary",
            "ssl certificate",
            "contacted",
            "whois record",
            "historical ssl",
            "threat roundup",
            "august",
            "tsara brashears",
            "whois whois",
            "execution",
            "dropped",
            "february",
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "alexa top",
            "team",
            "malicious site",
            "malware",
            "phishing",
            "union",
            "bank",
            "unsafe",
            "united",
            "bambernek simda",
            "commerce",
            "pykspa",
            "bambernek",
            "ip reputation",
            "database",
            "vawtrak",
            "blacklist http",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "reverse dns",
            "software",
            "general full",
            "resource",
            "hash",
            "get h2",
            "protocol h2",
            "security tls",
            "url http",
            "main",
            "attention",
            "please",
            "adblock pro",
            "loki",
            "mon jul",
            "first",
            "linkid252669",
            "pjp3sltkz",
            "heur",
            "malware site",
            "phishing site",
            "artemis",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "nircmd",
            "swrort",
            "downldr",
            "crack",
            "filetour",
            "cleaner",
            "wacatac",
            "xtrat",
            "genkryptik",
            "opencandy",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "xrat",
            "coinminer",
            "dropper",
            "alexa",
            "acint",
            "systweak",
            "behav",
            "download",
            "zbot",
            "xtreme",
            "installcore",
            "unruy",
            "patcher",
            "adload",
            "win64",
            "applicunwnt",
            "trojanspy",
            "webtoolbar",
            "cyber threat",
            "engineering",
            "firehol",
            "phishtank",
            "emotet",
            "ransomware",
            "malicious",
            "cobalt strike",
            "suppobox",
            "bradesco",
            "facebook",
            "banco",
            "nymaim",
            "smsspy",
            "stealer",
            "service",
            "mirai",
            "pony",
            "nanocore",
            "asyncrat",
            "downloader",
            "deepscan",
            "virut",
            "qakbot",
            "name verdict",
            "falcon sandbox",
            "blacklist https",
            "malicious url",
            "filerepmetagen",
            "et cins",
            "active threat",
            "reputation ip",
            "threats et",
            "cins active",
            "poor reputation",
            "ip tcp",
            "C2",
            "command_and_control",
            "spyware",
            "tracking",
            "targeting",
            "cyber stalking",
            "hostname",
            "simda",
            "kraken",
            "betabot",
            "zeus",
            "ramnit",
            "plasma",
            "citadel",
            "athena",
            "neutrino",
            "alina",
            "andromeda",
            "dexter",
            "unknown",
            "keylogger",
            "hawkeye",
            "phase",
            "jackpos",
            "spyeye",
            "vskimmer",
            "spitmo",
            "slingshot",
            "warbot",
            "redline stealer",
            "steam",
            "bandoo",
            "matsnu",
            "maltiverse",
            "bambernek gen",
            "internet storm",
            "infy",
            "inmortal",
            "addtopayload",
            "attack",
            "malvertizing"
          ],
          "references": [
            "https://networkpccontrol.com/video-player-1/?clickid=4030fe2twwhgxaa9&domain=standardtrackerchain.com&uclick=e2twwhgx&uclickhash=e2twwhgx-e2twwhgx-xoq53y-0-3zvc3y-oj1m9r-oj1m1n-5da44a",
            "https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45/65609b66e63f64cae305c749",
            "https://www.hybrid-analysis.com/sample/347314196559e7fbc75fc532daa774727b897d3a2156ea1328861f3b66f677a5/656146284d68f73e2306b6ad",
            "http://dev.findatoyota.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "SpyEye",
              "display_name": "SpyEye",
              "target": null
            },
            {
              "id": "Citadel",
              "display_name": "Citadel",
              "target": null
            },
            {
              "id": "MilesMX",
              "display_name": "MilesMX",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 81,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2450,
            "FileHash-SHA256": 2684,
            "domain": 1254,
            "URL": 9244,
            "CVE": 13,
            "FileHash-MD5": 931,
            "FileHash-SHA1": 487
          },
          "indicator_count": 17063,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "656e19dfeee6ead11dc6354e",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-12-04T18:26:39.448000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65612df2a7b287c614a94f94",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df2a7b287c614a94f94",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:50.158000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df1531ea0c35d79b1f4",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:49.909000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65610ac30744fcf636cc2a67",
          "name": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=",
          "description": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=2929&errtype=updatedownloaderinfo&funcname=updatedownloader::main&ibic=30b1f00119b0edae535883513aec9512&msg=start&os=mac_10_16&rnd=1663869393157734&ver=upd_01-27&verifier=db079154c6b8d1935cf1cf6cda123e25",
          "modified": "2023-12-24T19:00:45.425000",
          "created": "2023-11-24T20:42:43.965000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none file",
            "type textplain",
            "cyber threat",
            "united",
            "team",
            "covid19",
            "phishtank",
            "engineering",
            "phishing site",
            "malware site",
            "malware",
            "phishing",
            "malicious",
            "bank",
            "zeus",
            "zbot",
            "tinba",
            "stealer",
            "miner",
            "ponmocup",
            "ave maria",
            "artemis",
            "nymaim",
            "emotet",
            "redline stealer",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "ransomware",
            "matsnu",
            "kraken",
            "simda",
            "citadel",
            "vawtrak",
            "tag count",
            "mon oct",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "netsky",
            "team malware",
            "blacklist http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 222,
            "FileHash-SHA1": 122,
            "FileHash-SHA256": 2023,
            "URL": 6912,
            "domain": 1503,
            "hostname": 1755,
            "CVE": 1
          },
          "indicator_count": 12538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65610ac149b19048e822118b",
          "name": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=",
          "description": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=2929&errtype=updatedownloaderinfo&funcname=updatedownloader::main&ibic=30b1f00119b0edae535883513aec9512&msg=start&os=mac_10_16&rnd=1663869393157734&ver=upd_01-27&verifier=db079154c6b8d1935cf1cf6cda123e25",
          "modified": "2023-12-24T19:00:45.425000",
          "created": "2023-11-24T20:42:41.302000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none file",
            "type textplain",
            "cyber threat",
            "united",
            "team",
            "covid19",
            "phishtank",
            "engineering",
            "phishing site",
            "malware site",
            "malware",
            "phishing",
            "malicious",
            "bank",
            "zeus",
            "zbot",
            "tinba",
            "stealer",
            "miner",
            "ponmocup",
            "ave maria",
            "artemis",
            "nymaim",
            "emotet",
            "redline stealer",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "ransomware",
            "matsnu",
            "kraken",
            "simda",
            "citadel",
            "vawtrak",
            "tag count",
            "mon oct",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "netsky",
            "team malware",
            "blacklist http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 222,
            "FileHash-SHA1": 122,
            "FileHash-SHA256": 2023,
            "URL": 6912,
            "domain": 1503,
            "hostname": 1755,
            "CVE": 1
          },
          "indicator_count": 12538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655516871038cbad9eae2bb7",
          "name": "Apple | iOS | Automated Attacks | Resource Hijacking | Google Tracker",
          "description": "Boot or Logon Autostart Execution\nCommand and Scripting Interpreter\nAutomated Collection\nWebToolbar \nAmazon rsa\nAmazon02\nAmazon S3\nPrivilege Abuse\nRetaliation",
          "modified": "2023-12-15T18:02:25.356000",
          "created": "2023-11-15T19:05:43.285000",
          "tags": [
            "strong",
            "saal digital",
            "photo portal",
            "daten",
            "support",
            "saal",
            "bersicht",
            "informationen",
            "profis",
            "rabatte fr",
            "service",
            "heur",
            "malware",
            "cisco umbrella",
            "adware",
            "safe site",
            "malware site",
            "malicious site",
            "phishing site",
            "alexa top",
            "million",
            "tiggre",
            "presenoker",
            "agent",
            "opencandy",
            "conduit",
            "unsafe",
            "wacatac",
            "artemis",
            "phishing",
            "iframe",
            "installpack",
            "xrat",
            "fusioncore",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "genkryptik",
            "exploit",
            "filetour",
            "cleaner",
            "webtoolbar",
            "trojanspy",
            "get fdm",
            "ms windows",
            "pe32",
            "intel",
            "search",
            "show",
            "united",
            "entries",
            "systemdrive",
            "program files",
            "installer",
            "write",
            "delphi",
            "next",
            "june",
            "win32",
            "copy",
            "pixel",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "variables",
            "langpage string",
            "lang",
            "saalgroup",
            "creoletohtml",
            "chat",
            "reverse dns",
            "resource",
            "general full",
            "asn16509",
            "amazon02",
            "url https",
            "security tls",
            "protocol h2",
            "hash",
            "get h2",
            "main",
            "request chain",
            "http",
            "de redirected",
            "http redirect",
            "site",
            "malicious url",
            "blacklist https",
            "domain",
            "screenshot",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "amazons3",
            "aes128gcm",
            "amazon rsa",
            "aes256",
            "date",
            "name verdict",
            "pattern match",
            "root ca",
            "script",
            "done adding",
            "catalog file",
            "file",
            "indicator",
            "authority",
            "class",
            "mitre att",
            "meta",
            "unknown",
            "error",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "refresh",
            "tools",
            "null",
            "body",
            "create c",
            "html document",
            "xport",
            "noname057",
            "generic malware",
            "generic",
            "dapato",
            "alexa",
            "installcore",
            "downloader",
            "dropper",
            "outbreak",
            "iobit",
            "mediaget",
            "azorult",
            "runescape",
            "facebook",
            "bank",
            "download",
            "live",
            "rms",
            "maltiverse",
            "cyber threat",
            "engineering",
            "services",
            "malicious host",
            "malicious",
            "team",
            "zeus",
            "nymaim",
            "zbot",
            "simda",
            "asyncrat",
            "cobalt strike",
            "ransomware",
            "matsnu",
            "cutwail",
            "citadel",
            "pykspa",
            "raccoon",
            "kronos",
            "ramnit",
            "redline stealer",
            "apple",
            "apple",
            "html info",
            "title saal",
            "meta tags",
            "trackers google",
            "tag manager",
            "gtm5wjlq2",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "hostname",
            "anonymizer",
            "firehol",
            "mail spammer",
            "team proxy",
            "kraken",
            "suppobox",
            "tofsee",
            "vawtrak",
            "hotmail",
            "netsky",
            "stealer",
            "blacknet rat",
            "remcos",
            "miner",
            "hacktool",
            "trojan",
            "detplock",
            "team phishing",
            "a nxdomain",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "urls",
            "files",
            "ip address",
            "all search",
            "otx octoseek",
            "files ip",
            "contacted",
            "whois record",
            "ssl certificate",
            "pe resource",
            "bundled",
            "attack",
            "parent",
            "historical ssl",
            "collections",
            "communicating",
            "emotet",
            "execution",
            "markmonitor inc",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "trid win32",
            "archive",
            "valid",
            "serial number",
            "valid from",
            "valid usage",
            "code signing",
            "status status",
            "valid issuer",
            "assured id",
            "issuer issuer",
            "symantec sha256",
            "sections",
            "file type",
            "trid generic",
            "cil executable",
            "contained",
            "details module",
            "version id",
            "typelib id",
            "header target",
            "machine intel",
            "utc entry",
            "point",
            "sections name",
            "streams size",
            "entropy chi2",
            "guid",
            "blob",
            "namecheap",
            "ip detections",
            "country",
            "resolutions",
            "referrer",
            "whois whois",
            "threat roundup",
            "parent domain",
            "CVE-2023-22518",
            "CVE-2017-0143",
            "CVE-2017-0147",
            "CVE-2020-0601",
            "CVE-2017-8570",
            "CVE-2018-4893",
            "CVE-2017-11882",
            "CVE-2017-0199",
            "CVE-2014-3153",
            "W32.AIDetectNet.01",
            "trojan.adload/ursu",
            "targeting tsara brashears",
            "cybercrime",
            "privilege escalation",
            "defacement",
            "privilege abuse",
            "soc",
            "red team",
            "social engineering",
            "retaliation",
            "assault victim",
            "obsession"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
            "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
            "\u2193 Interesting \u2193",
            "owa.telegrafix.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
            "christ.robert@gmx.de",
            "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
            "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8",
            "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
            "BEELab_web_1.0.2-prerelease.exe",
            "AfraidZad.exe",
            "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
            "greycroftpartners.com",
            "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
            "trkpls3.com",
            "eg-monitoring.com",
            "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
            "https://twitter.com/PORNO_SEXYBABES"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Italy",
            "Singapore",
            "France",
            "Germany",
            "Korea, Republic of"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 841,
            "FileHash-SHA1": 467,
            "FileHash-SHA256": 6370,
            "CVE": 9,
            "domain": 2160,
            "hostname": 3074,
            "email": 1,
            "URL": 6550,
            "SSLCertFingerprint": 1,
            "CIDR": 3
          },
          "indicator_count": 19476,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65551682899b039e02b8dc8a",
          "name": "Apple | iOS | Automated Attacks | Resource Hijacking | Google Tracker",
          "description": "Boot or Logon Autostart Execution\nCommand and Scripting Interpreter\nAutomated Collection\nWebToolbar \nAmazon rsa\nAmazon02\nAmazon S3\nPrivilege Abuse\nRetaliation",
          "modified": "2023-12-15T18:02:25.356000",
          "created": "2023-11-15T19:05:38.437000",
          "tags": [
            "strong",
            "saal digital",
            "photo portal",
            "daten",
            "support",
            "saal",
            "bersicht",
            "informationen",
            "profis",
            "rabatte fr",
            "service",
            "heur",
            "malware",
            "cisco umbrella",
            "adware",
            "safe site",
            "malware site",
            "malicious site",
            "phishing site",
            "alexa top",
            "million",
            "tiggre",
            "presenoker",
            "agent",
            "opencandy",
            "conduit",
            "unsafe",
            "wacatac",
            "artemis",
            "phishing",
            "iframe",
            "installpack",
            "xrat",
            "fusioncore",
            "riskware",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "genkryptik",
            "exploit",
            "filetour",
            "cleaner",
            "webtoolbar",
            "trojanspy",
            "get fdm",
            "ms windows",
            "pe32",
            "intel",
            "search",
            "show",
            "united",
            "entries",
            "systemdrive",
            "program files",
            "installer",
            "write",
            "delphi",
            "next",
            "june",
            "win32",
            "copy",
            "pixel",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "variables",
            "langpage string",
            "lang",
            "saalgroup",
            "creoletohtml",
            "chat",
            "reverse dns",
            "resource",
            "general full",
            "asn16509",
            "amazon02",
            "url https",
            "security tls",
            "protocol h2",
            "hash",
            "get h2",
            "main",
            "request chain",
            "http",
            "de redirected",
            "http redirect",
            "site",
            "malicious url",
            "blacklist https",
            "domain",
            "screenshot",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "amazons3",
            "aes128gcm",
            "amazon rsa",
            "aes256",
            "date",
            "name verdict",
            "pattern match",
            "root ca",
            "script",
            "done adding",
            "catalog file",
            "file",
            "indicator",
            "authority",
            "class",
            "mitre att",
            "meta",
            "unknown",
            "error",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "generator",
            "critical",
            "refresh",
            "tools",
            "null",
            "body",
            "create c",
            "html document",
            "xport",
            "noname057",
            "generic malware",
            "generic",
            "dapato",
            "alexa",
            "installcore",
            "downloader",
            "dropper",
            "outbreak",
            "iobit",
            "mediaget",
            "azorult",
            "runescape",
            "facebook",
            "bank",
            "download",
            "live",
            "rms",
            "maltiverse",
            "cyber threat",
            "engineering",
            "services",
            "malicious host",
            "malicious",
            "team",
            "zeus",
            "nymaim",
            "zbot",
            "simda",
            "asyncrat",
            "cobalt strike",
            "ransomware",
            "matsnu",
            "cutwail",
            "citadel",
            "pykspa",
            "raccoon",
            "kronos",
            "ramnit",
            "redline stealer",
            "apple",
            "apple",
            "html info",
            "title saal",
            "meta tags",
            "trackers google",
            "tag manager",
            "gtm5wjlq2",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "hostname",
            "anonymizer",
            "firehol",
            "mail spammer",
            "team proxy",
            "kraken",
            "suppobox",
            "tofsee",
            "vawtrak",
            "hotmail",
            "netsky",
            "stealer",
            "blacknet rat",
            "remcos",
            "miner",
            "hacktool",
            "trojan",
            "detplock",
            "team phishing",
            "a nxdomain",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "urls",
            "files",
            "ip address",
            "all search",
            "otx octoseek",
            "files ip",
            "contacted",
            "whois record",
            "ssl certificate",
            "pe resource",
            "bundled",
            "attack",
            "parent",
            "historical ssl",
            "collections",
            "communicating",
            "emotet",
            "execution",
            "markmonitor inc",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "trid win32",
            "archive",
            "valid",
            "serial number",
            "valid from",
            "valid usage",
            "code signing",
            "status status",
            "valid issuer",
            "assured id",
            "issuer issuer",
            "symantec sha256",
            "sections",
            "file type",
            "trid generic",
            "cil executable",
            "contained",
            "details module",
            "version id",
            "typelib id",
            "header target",
            "machine intel",
            "utc entry",
            "point",
            "sections name",
            "streams size",
            "entropy chi2",
            "guid",
            "blob",
            "namecheap",
            "ip detections",
            "country",
            "resolutions",
            "referrer",
            "whois whois",
            "threat roundup",
            "parent domain",
            "CVE-2023-22518",
            "CVE-2017-0143",
            "CVE-2017-0147",
            "CVE-2020-0601",
            "CVE-2017-8570",
            "CVE-2018-4893",
            "CVE-2017-11882",
            "CVE-2017-0199",
            "CVE-2014-3153",
            "W32.AIDetectNet.01",
            "trojan.adload/ursu",
            "targeting tsara brashears",
            "cybercrime",
            "privilege escalation",
            "defacement",
            "privilege abuse",
            "soc",
            "red team",
            "social engineering",
            "retaliation",
            "assault victim",
            "obsession"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
            "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
            "\u2193 Interesting \u2193",
            "owa.telegrafix.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
            "christ.robert@gmx.de",
            "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
            "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8",
            "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
            "BEELab_web_1.0.2-prerelease.exe",
            "AfraidZad.exe",
            "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
            "greycroftpartners.com",
            "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
            "trkpls3.com",
            "eg-monitoring.com",
            "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
            "https://twitter.com/PORNO_SEXYBABES"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Italy",
            "Singapore",
            "France",
            "Germany",
            "Korea, Republic of"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 841,
            "FileHash-SHA1": 467,
            "FileHash-SHA256": 6370,
            "CVE": 9,
            "domain": 2160,
            "hostname": 3074,
            "email": 1,
            "URL": 6550,
            "SSLCertFingerprint": 1,
            "CIDR": 3
          },
          "indicator_count": 19476,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6436d51f1fc49f3801c8e911",
          "name": "hash google",
          "description": "google",
          "modified": "2023-08-27T00:04:28.322000",
          "created": "2023-04-12T15:58:23.454000",
          "tags": [
            "store gmail",
            "images sign",
            "delete delete",
            "report",
            "how search",
            "carbon",
            "settings search",
            "advanced",
            "search search",
            "search help"
          ],
          "references": [
            ".database_uuid",
            "https://www.google.com/#sbfbu=1&pi="
          ],
          "public": 1,
          "adversary": "DNSpionage",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 14146,
            "FilePath": 1,
            "domain": 153,
            "FileHash-MD5": 2822,
            "FileHash-SHA1": 2821,
            "URL": 32,
            "hostname": 98,
            "IPv4": 13,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 20090,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 83,
          "modified_text": "966 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://dev.findatoyota.com/",
        "greycroftpartners.com",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "838114.parkingcrew.net",
        "24-70mm.camera",
        "https://itunes.apple.com/de/app/saal-design-app/id1481631197?mt=8",
        "http://videotubeplayer.com/?groupds=1&clientId=201&productId=1407&tracking=w5JJ46MKQI493DMO1NDNTQ6K&publisher_id=",
        "mwilliams.dev@gmail.com | piratepages.com",
        "https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45/65609b66e63f64cae305c749",
        "cdn.pornsocket.com",
        "campaign-manager.sharecare.com",
        "t.prototype.hasownproperty.call",
        "www.anyxxxtube.net",
        "https://severeporn-com.pornproxy.page/",
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
        "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "www.redtube.comyouporn.com",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "dropboxpayments.com",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "https://www.google.com/#sbfbu=1&pi=",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "ns2.abovedomains.com",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "static-push-preprod.porndig.com",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "Trojan:Win32/WannaCry.350",
        "cellebrite.com | enterprise.cellebrite.com",
        "AfraidZad.exe",
        "114.114.114.114",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://play.google.com/store/apps/details?id=com.saaldigital.designerapp.de&hl=de",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "cams4all.com",
        "\u2193 Interesting \u2193",
        "imp.fusioninstall.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://simtk.org/projects/sv_tests   (Tsara Brashears project?)",
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "http://xred.mooo.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "qa.companycam.com",
        "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/     (Phishing)",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/",
        "https://networkpccontrol.com/video-player-1/?clickid=4030fe2twwhgxaa9&domain=standardtrackerchain.com&uclick=e2twwhgx&uclickhash=e2twwhgx-e2twwhgx-xoq53y-0-3zvc3y-oj1m9r-oj1m1n-5da44a",
        "angebot.staude.de",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "https://httpdev.findatoyota.com",
        "xhamster.comyouporn.com",
        "ww1.imobitracking.net",
        "pirateproxy.cc",
        "owa.telegrafix.com",
        "https://www.hybrid-analysis.com/sample/dcf9f5e78d4645b38540d25c4d8ca7fe3e019671caadf7cade4cc01008282bff",
        "yoursexy.porn | indianyouporn.com",
        "http://trkr.similarphotocleaner.com/trackerwcfsrv/tracker.svc/trackoffersview/?q=pxl=mco2191_mco2146_mco1132&utm_source=mcosfl&utm_medium=mcosfl&utm_campaign=mcosfl&x-count=1&x-context=osversion-5.1",
        "TrojanSpy:Win32/Nivdort.DE",
        "weconnect.com",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/",
        "ww16.porn-community.porn25.com",
        "https://www.hybrid-analysis.com/sample/347314196559e7fbc75fc532daa774727b897d3a2156ea1328861f3b66f677a5/656146284d68f73e2306b6ad",
        "https://mail.greycroft.com/owa/redir.aspx?SURL=a0oI1dvGGkFYUoACVEbN8REVrmfS6H0MhUvXdexgmertl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAHAAcgBvAGQAdQBjAHQAaAB1AG4AdAAuAGMAbwBtAC8AdABlAGMAaAAvAGEAbgBpAG0AYQB0AGkAYwA.&URL=https://www.producthunt.com/tech/animatic",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "Alerts: nids_malware_alert network_icmp persistence_autorun",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "https://secure.medicalexpo.com/request-management-ws/views/contact-details.xhtml?token=A3QIgyaKRur%2BIjZfA4R8MkKBwXLdgMI5Gg%2F0dwmuMj0",
        "http://45.159.189.105/bot/regex",
        "watchhers.net",
        "jimgaffigan.com",
        "eg-monitoring.com",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        ".database_uuid",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "BEELab_web_1.0.2-prerelease.exe",
        "deviceinbox.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "christ.robert@gmx.de",
        "http://manage.apple.com.webobjectsd5dbc98dcc983a7028bd82d1a47540.dsiblings.com/Info/information.html",
        "signin-appleid.jackpotiot.com",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "youramateuporn.com",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "qbot.zip",
        "https://mylegalbid.com/malwarebytes",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "https://www.saal-digital.de/ordercockpit/?email=christ.robert@gmx.de&ordernumber=802109030129517",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://hybrid-analysis.com/sample/9e8ce8607b7f32f6f66c8126851a55818ff775ee060d2c448679e5eb1e22ba2a",
        "trkpls3.com",
        "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "NSO Group - Pegasus",
            "DNSpionage"
          ],
          "malware_families": [
            "Webtoolbar",
            "Tiggre",
            "Fakeav",
            "Alf:trojan:win32/cassini_ade36583",
            "Virut",
            "Win.malware.zusy",
            "Alf:heraklezeval:pws:win32/qqpass!rfn",
            "Bandoo",
            "Private internet access",
            "Rms",
            "Xrat",
            "Maltiverse",
            "Generic",
            "Trojan:win32/kaicorn!rf",
            "Ransom:win32/wannaren",
            "Win.trojan.clicker-3506",
            "Trojanspy:win32/nivdort.de",
            "Domains",
            "Win.dropper.tiggre-9845940-0",
            "Win.malware.midie-6847892-0",
            "Remcos",
            "Et",
            "Inmortal",
            "Alf:hstr:trojandownloader:win32/purityscan.a!bit",
            "Locky",
            "Worm:win32/autorun",
            "Win.trojan.cycler-47",
            "Vawtrak",
            "Win32:malob-bx\\ [cryp]",
            "Floxif",
            "Spyeye",
            "Toga!rfn",
            "Azorult cnc",
            "Possible",
            "Win32:banker",
            "Ransom:msil/genasom.i",
            "Ransom:win32/haperlock",
            "Tulach malware",
            "Win.downloader.unruy-10026469-0",
            "Trojan:win32/startpage",
            "Win.packed.xtremerat-9837419-0",
            "Trojan:win32/wannacry.350",
            "Trojandropper:win32/ponmocup",
            "Swipper",
            "Malware",
            "Win32:malware",
            "Alf:heraklezeval:trojandownloader:win32/unruy",
            "#lowfi:suspicioussectionname",
            "Win.trojan.fraudpack",
            "Win.packed.kelios-10023944-0",
            "Virtool",
            "Milesmx",
            "Alf:heraklezeval:trojandownloader:win32/unruy!rfn",
            "Win.malware.eclz-9953021-0",
            "Formbook",
            "Win.malware.sfwx-9853337-0",
            "Ebury",
            "Opencandy",
            "Backdoor:win32/tofsee.t",
            "Citadel",
            "#lowfitrojan:js/auto25",
            "Trojan:win32/floxif.e",
            "Tofsee",
            "Pws:win32/qqpass.b!mtb",
            "Adware affiliate",
            "Win.dropper.unruy-9994363-0",
            "Win.malware.urelas",
            "N\u2205 ip",
            "Worm:win32/cambot!rfn",
            "Win.trojan.unruy-5885",
            "Win.malware.remoteadmin-7056666-0",
            "Trojanspy",
            "Suppobox",
            "Virtool:win32/obfuscator.ki"
          ],
          "industries": [
            "Government",
            "Healthcare"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 21,
  "pulses": [
    {
      "id": "69aa0a62f94a92b5168405c2",
      "name": "fedpaypal clone Q vashti",
      "description": "",
      "modified": "2026-03-06T06:39:27.872000",
      "created": "2026-03-05T22:57:38.559000",
      "tags": [
        "present sep",
        "virtool",
        "cryp",
        "win32",
        "ip address",
        "trojan",
        "ransom",
        "asn as54113",
        "passive dns",
        "msil",
        "united states",
        "dynamicloader",
        "qaeaav12",
        "high",
        "qbeipbdii",
        "write",
        "paypal",
        "medium",
        "search",
        "vmware",
        "floodfix",
        "malware",
        "united",
        "mtb apr",
        "hostname add",
        "write c",
        "read c",
        "yara detections",
        "upxoepplace",
        "next",
        "markus",
        "april",
        "ping",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "443 ma2592000",
        "ipv4 add",
        "url analysis",
        "urls",
        "body",
        "title",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "status",
        "name servers",
        "set cookie",
        "script urls",
        "present feb",
        "cookie",
        "template",
        "present oct",
        "present jul",
        "present dec",
        "present jun",
        "next associated",
        "urls show",
        "date checked",
        "present apr",
        "url hostname",
        "united kingdom",
        "unknown ns",
        "servers",
        "great britain",
        "msr aug",
        "msr apr",
        "msr nov",
        "ite o",
        "server response",
        "script script",
        "files show",
        "date hash",
        "avast avg",
        "creation date",
        "lcid1033",
        "sminnotek",
        "spnvirtualbox",
        "bvvirtualbox",
        "present mar",
        "present nov",
        "exploit",
        "error",
        "server response",
        "google safe",
        "results sep",
        "backdoor",
        "certificate",
        "mtb sep",
        "next http",
        "scans show",
        "present may",
        "results jun",
        "results jan",
        "worm",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "ids detections",
        "cape",
        "viking",
        "philis",
        "et",
        "torop",
        "des moines",
        "contacted hosts",
        "content reputation",
        "sabey type",
        "tulach type",
        "rexx type",
        "foundry type",
        "fred scherr",
        "twitter",
        "apple",
        "monitored target",
        "financial theft",
        "psalms 27: 1 - 14"
      ],
      "references": [
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fraudpack",
          "display_name": "Win.Trojan.Fraudpack",
          "target": null
        },
        {
          "id": "Fakeav",
          "display_name": "Fakeav",
          "target": null
        },
        {
          "id": "Ransom:MSIL/Genasom.I",
          "display_name": "Ransom:MSIL/Genasom.I",
          "target": "/malware/Ransom:MSIL/Genasom.I"
        },
        {
          "id": "Virtool:Win32/Obfuscator.KI",
          "display_name": "Virtool:Win32/Obfuscator.KI",
          "target": "/malware/Virtool:Win32/Obfuscator.KI"
        },
        {
          "id": "Toga!rfn",
          "display_name": "Toga!rfn",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Remoteadmin-7056666-0",
          "display_name": "Win.Malware.Remoteadmin-7056666-0",
          "target": null
        },
        {
          "id": "Floxif",
          "display_name": "Floxif",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Dropper.Unruy-9994363-0",
          "display_name": "Win.Dropper.Unruy-9994363-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Cycler-47",
          "display_name": "Win.Trojan.Cycler-47",
          "target": null
        },
        {
          "id": "Win.Trojan.Clicker-3506",
          "display_name": "Win.Trojan.Clicker-3506",
          "target": null
        },
        {
          "id": "Win.Downloader.Unruy-10026469-0",
          "display_name": "Win.Downloader.Unruy-10026469-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Urelas",
          "display_name": "Win.Malware.Urelas",
          "target": null
        },
        {
          "id": "Win.Malware.Zusy",
          "display_name": "Win.Malware.Zusy",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "target": null
        },
        {
          "id": "Win.Malware.Eclz-9953021-0",
          "display_name": "Win.Malware.Eclz-9953021-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "target": null
        },
        {
          "id": "Win.Dropper.Tiggre-9845940-0",
          "display_name": "Win.Dropper.Tiggre-9845940-0",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Win.Malware.Sfwx-9853337-0",
          "display_name": "Win.Malware.Sfwx-9853337-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Trojan:Win32/Kaicorn!rf",
          "display_name": "Trojan:Win32/Kaicorn!rf",
          "target": "/malware/Trojan:Win32/Kaicorn!rf"
        },
        {
          "id": "Win32:Banker",
          "display_name": "Win32:Banker",
          "target": null
        },
        {
          "id": "Worm:Win32/Cambot!rfn",
          "display_name": "Worm:Win32/Cambot!rfn",
          "target": "/malware/Worm:Win32/Cambot!rfn"
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847892-0",
          "display_name": "Win.Malware.Midie-6847892-0",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1595.002",
          "name": "Vulnerability Scanning",
          "display_name": "T1595.002 - Vulnerability Scanning"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68c5743593a4bcc81dd94b0b",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1323,
        "URL": 4360,
        "FileHash-MD5": 759,
        "FileHash-SHA1": 748,
        "FileHash-SHA256": 5148,
        "domain": 1076,
        "email": 7
      },
      "indicator_count": 13421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "44 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c5743593a4bcc81dd94b0b",
      "name": "Fed.PayPal.com - Ransom | Attacks via redirect",
      "description": "A monitored target, active on various payment platforms for business documented a malicious redirect event 1st seen in 2020. Follows pattern of multiple, critical and ongoing attacks beginning in 2013. In this instance target lost access to PayPal payments. If this is legal, it\u2019s been a grotesque grift. Target was financially and otherwise robbed.\n\n\n#trulymissed #paypal #advesaries #apple #twitter #backdoor #ransom #botnet #reptutationattack",
      "modified": "2025-10-13T13:27:11.277000",
      "created": "2025-09-13T13:40:05.671000",
      "tags": [
        "present sep",
        "virtool",
        "cryp",
        "win32",
        "ip address",
        "trojan",
        "ransom",
        "asn as54113",
        "passive dns",
        "msil",
        "united states",
        "dynamicloader",
        "qaeaav12",
        "high",
        "qbeipbdii",
        "write",
        "paypal",
        "medium",
        "search",
        "vmware",
        "floodfix",
        "malware",
        "united",
        "mtb apr",
        "hostname add",
        "write c",
        "read c",
        "yara detections",
        "upxoepplace",
        "next",
        "markus",
        "april",
        "ping",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "443 ma2592000",
        "ipv4 add",
        "url analysis",
        "urls",
        "body",
        "title",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "status",
        "name servers",
        "set cookie",
        "script urls",
        "present feb",
        "cookie",
        "template",
        "present oct",
        "present jul",
        "present dec",
        "present jun",
        "next associated",
        "urls show",
        "date checked",
        "present apr",
        "url hostname",
        "united kingdom",
        "unknown ns",
        "servers",
        "great britain",
        "msr aug",
        "msr apr",
        "msr nov",
        "ite o",
        "server response",
        "script script",
        "files show",
        "date hash",
        "avast avg",
        "creation date",
        "lcid1033",
        "sminnotek",
        "spnvirtualbox",
        "bvvirtualbox",
        "present mar",
        "present nov",
        "exploit",
        "error",
        "server response",
        "google safe",
        "results sep",
        "backdoor",
        "certificate",
        "mtb sep",
        "next http",
        "scans show",
        "present may",
        "results jun",
        "results jan",
        "worm",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "ids detections",
        "cape",
        "viking",
        "philis",
        "et",
        "torop",
        "des moines",
        "contacted hosts",
        "content reputation",
        "sabey type",
        "tulach type",
        "rexx type",
        "foundry type",
        "fred scherr",
        "twitter",
        "apple",
        "monitored target",
        "financial theft",
        "psalms 27: 1 - 14"
      ],
      "references": [
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fraudpack",
          "display_name": "Win.Trojan.Fraudpack",
          "target": null
        },
        {
          "id": "Fakeav",
          "display_name": "Fakeav",
          "target": null
        },
        {
          "id": "Ransom:MSIL/Genasom.I",
          "display_name": "Ransom:MSIL/Genasom.I",
          "target": "/malware/Ransom:MSIL/Genasom.I"
        },
        {
          "id": "Virtool:Win32/Obfuscator.KI",
          "display_name": "Virtool:Win32/Obfuscator.KI",
          "target": "/malware/Virtool:Win32/Obfuscator.KI"
        },
        {
          "id": "Toga!rfn",
          "display_name": "Toga!rfn",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Remoteadmin-7056666-0",
          "display_name": "Win.Malware.Remoteadmin-7056666-0",
          "target": null
        },
        {
          "id": "Floxif",
          "display_name": "Floxif",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Dropper.Unruy-9994363-0",
          "display_name": "Win.Dropper.Unruy-9994363-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Cycler-47",
          "display_name": "Win.Trojan.Cycler-47",
          "target": null
        },
        {
          "id": "Win.Trojan.Clicker-3506",
          "display_name": "Win.Trojan.Clicker-3506",
          "target": null
        },
        {
          "id": "Win.Downloader.Unruy-10026469-0",
          "display_name": "Win.Downloader.Unruy-10026469-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Urelas",
          "display_name": "Win.Malware.Urelas",
          "target": null
        },
        {
          "id": "Win.Malware.Zusy",
          "display_name": "Win.Malware.Zusy",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "target": null
        },
        {
          "id": "Win.Malware.Eclz-9953021-0",
          "display_name": "Win.Malware.Eclz-9953021-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "target": null
        },
        {
          "id": "Win.Dropper.Tiggre-9845940-0",
          "display_name": "Win.Dropper.Tiggre-9845940-0",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Win.Malware.Sfwx-9853337-0",
          "display_name": "Win.Malware.Sfwx-9853337-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Trojan:Win32/Kaicorn!rf",
          "display_name": "Trojan:Win32/Kaicorn!rf",
          "target": "/malware/Trojan:Win32/Kaicorn!rf"
        },
        {
          "id": "Win32:Banker",
          "display_name": "Win32:Banker",
          "target": null
        },
        {
          "id": "Worm:Win32/Cambot!rfn",
          "display_name": "Worm:Win32/Cambot!rfn",
          "target": "/malware/Worm:Win32/Cambot!rfn"
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847892-0",
          "display_name": "Win.Malware.Midie-6847892-0",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1595.002",
          "name": "Vulnerability Scanning",
          "display_name": "T1595.002 - Vulnerability Scanning"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1321,
        "URL": 4356,
        "FileHash-MD5": 759,
        "FileHash-SHA1": 748,
        "FileHash-SHA256": 5148,
        "domain": 1076,
        "email": 7
      },
      "indicator_count": 13415,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "188 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "686df81130f94fff809dd8b7",
      "name": "T-Mobile Service- 23.185.0.2 - Mirai",
      "description": "",
      "modified": "2025-08-08T04:05:03.809000",
      "created": "2025-07-09T05:03:13.536000",
      "tags": [
        "germany unknown",
        "passive dns",
        "invalid url",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "frankfurt",
        "main",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr11",
        "validity",
        "public key",
        "info",
        "south korea",
        "united",
        "taiwan as3462",
        "as21928",
        "china as4134",
        "as4766 korea",
        "china as4837",
        "as9318 sk",
        "high",
        "as701 verizon",
        "malware",
        "copy",
        "name jim",
        "zemlin name",
        "letterman dr",
        "address bldg",
        "d ste",
        "date",
        "dnssec",
        "record value",
        "emails",
        "address",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results jul",
        "present jul",
        "present showing",
        "entries related",
        "domains show",
        "present jun",
        "search",
        "enom",
        "creation date",
        "encrypt"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 178,
        "FileHash-SHA1": 180,
        "FileHash-SHA256": 2435,
        "hostname": 644,
        "domain": 603,
        "URL": 585,
        "email": 3
      },
      "indicator_count": 4628,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "254 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e6547f22d43d6d149cac7a",
      "name": "RedCap Abuse | The 1st Pulse was deleted from OTX . AlienVault",
      "description": "Another example of target working with a hacker impersonating some7he.sje was not. The hackers had the perfect opportunity to stay attached to Dropbox, photos. microphone and highlighted heavily targets location. || Target was suspicious about several issues related to pair. Hacker has only one piece of equipment for project. Target basically had to give him all , tips, cues and direction for project. If this Pulse is deleted I don't know what to think.",
      "modified": "2024-10-15T02:02:53.504000",
      "created": "2024-09-15T03:29:03.699000",
      "tags": [
        "urls",
        "passive dns",
        "http",
        "unique",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "ip address",
        "related nids",
        "code",
        "process32nextw",
        "intel",
        "ms windows",
        "united",
        "pe32",
        "search",
        "module load",
        "t1129",
        "read c",
        "default",
        "path",
        "write",
        "malware",
        "copy",
        "win32",
        "suspicious",
        "unknown",
        "united kingdom",
        "set cookie",
        "as43350 nforce",
        "script urls",
        "as55286",
        "status",
        "cookie",
        "trojan",
        "template",
        "showing",
        "entries",
        "body",
        "ransom",
        "meta",
        "a div",
        "div div",
        "ipv4",
        "script script",
        "as16276",
        "france unknown",
        "link",
        "span a",
        "span span",
        "span",
        "class",
        "pragma",
        "servers",
        "creation date",
        "emails",
        "domain",
        "expiration date",
        "cname",
        "aaaa",
        "certificate",
        "lowfitrojan",
        "hstr",
        "jsauto25 jun",
        "pm lowfitrojan",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "endpoints all",
        "trojan features",
        "date hash",
        "as15169 google",
        "as44273 host",
        "september",
        "de indicators",
        "domains",
        "hashes",
        "dynamicloader",
        "yara detections",
        "enigmaprotector",
        "high",
        "bios",
        "dynamic",
        "filehash",
        "yaxpax",
        "yapaxi",
        "zp6axi0",
        "cuckoo",
        "name servers",
        "domains ii",
        "for privacy",
        "redacted for",
        "next",
        "domain address",
        "alienvault name",
        "server",
        "flag",
        "contacted hosts",
        "process details",
        "misc attack",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "exit node",
        "traffic group",
        "suricata",
        "overview ip",
        "address",
        "files location",
        "flag united",
        "hostname",
        "files domain",
        "months ago",
        "created",
        "email",
        "modified",
        "filehashsha1",
        "filehashsha256",
        "white cve",
        "cyber",
        "xamzexpires300",
        "twitter",
        "xor ddos",
        "xorddos",
        "hacktool",
        "bazaarloader",
        "redcap",
        "formbook",
        "locky",
        "lockbit",
        "ransomware",
        "target",
        "ebury",
        "virustotal",
        "crypter",
        "shadowpad",
        "corrupt",
        "cryptor",
        "android",
        "xrat",
        "xtrat",
        "malicious",
        "honeypot",
        "fraud",
        "already",
        "behav",
        "ragnar locker",
        "swipper",
        "n\u2205 ip",
        "write c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "delete c",
        "execution",
        "dock",
        "persistence",
        "august",
        "asnone bulgaria",
        "sales",
        "algorithm",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "whois lookups",
        "dnssec",
        "domain name",
        "abuse contact",
        "registrar abuse",
        "contact phone",
        "registrar iana",
        "date",
        "dns replication",
        "record type",
        "ttl value",
        "msms33388520",
        "data",
        "cus starizona",
        "cngo daddy",
        "authority",
        "g2 validity"
      ],
      "references": [
        "TrojanSpy:Win32/Nivdort.DE",
        "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
        "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
        "Alerts: nids_malware_alert network_icmp persistence_autorun"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Ransom:Win32/Haperlock",
          "display_name": "Ransom:Win32/Haperlock",
          "target": "/malware/Ransom:Win32/Haperlock"
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_ade36583",
          "display_name": "ALF:Trojan:Win32/Cassini_ade36583",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
          "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
          "target": null
        },
        {
          "id": "Ransom:Win32/Wannaren",
          "display_name": "Ransom:Win32/Wannaren",
          "target": "/malware/Ransom:Win32/Wannaren"
        },
        {
          "id": "#LowfiTrojan:JS/Auto25",
          "display_name": "#LowfiTrojan:JS/Auto25",
          "target": "/malware/#LowfiTrojan:JS/Auto25"
        },
        {
          "id": "Trojan:Win32/Startpage",
          "display_name": "Trojan:Win32/Startpage",
          "target": "/malware/Trojan:Win32/Startpage"
        },
        {
          "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
          "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
          "target": null
        },
        {
          "id": "Win.Packed.XtremeRAT-9837419-0",
          "display_name": "Win.Packed.XtremeRAT-9837419-0",
          "target": null
        },
        {
          "id": "Win.Packed.Kelios-10023944-0",
          "display_name": "Win.Packed.Kelios-10023944-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Unruy-5885",
          "display_name": "Win.Trojan.Unruy-5885",
          "target": null
        },
        {
          "id": "Ebury",
          "display_name": "Ebury",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Swipper",
          "display_name": "Swipper",
          "target": null
        },
        {
          "id": "N\u2205 IP",
          "display_name": "N\u2205 IP",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.DE",
          "display_name": "TrojanSpy:Win32/Nivdort.DE",
          "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [
        "Government",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4315,
        "FileHash-MD5": 573,
        "FileHash-SHA1": 550,
        "FileHash-SHA256": 4114,
        "domain": 4757,
        "hostname": 2075,
        "SSLCertFingerprint": 5,
        "email": 14,
        "CIDR": 1
      },
      "indicator_count": 16404,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66db032984e6013ddf6c58cf",
      "name": "internet.bs",
      "description": "",
      "modified": "2024-09-06T13:27:05.152000",
      "created": "2024-09-06T13:27:05.152000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 101
      },
      "indicator_count": 101,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 177,
      "modified_text": "590 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be56d6df9d36bac14ccd87",
      "name": "AZORult CnC",
      "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
      "modified": "2024-03-04T14:03:17.574000",
      "created": "2024-02-03T15:08:06.808000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "whois whois",
        "january",
        "historical ssl",
        "referrer",
        "april",
        "resolutions",
        "siblings domain",
        "march",
        "february",
        "obz4usfn0 http",
        "problems",
        "threat network",
        "infrastructure",
        "st201601152",
        "startpage",
        "iframe",
        "united",
        "unknown",
        "search",
        "showing",
        "united kingdom",
        "creation date",
        "aaaa",
        "cname",
        "scan endpoints",
        "all octoseek",
        "date",
        "next",
        "script urls",
        "soa nxdomain",
        "link",
        "xml title",
        "portugal",
        "domain",
        "status",
        "expiration date",
        "pulse pulses",
        "as44273 host",
        "domain robot",
        "as61969 team",
        "body",
        "as8075",
        "netherlands",
        "servers",
        "emails",
        "duo insight",
        "type",
        "asnone united",
        "name servers",
        "germany unknown",
        "passive dns",
        "as14061",
        "as49453",
        "lowfi",
        "a domains",
        "urls",
        "privacy inc",
        "customer",
        "trojandropper",
        "dynamicloader",
        "default",
        "medium",
        "entries",
        "khtml",
        "download",
        "show",
        "activity",
        "http",
        "copy",
        "write",
        "malware",
        "adware affiliate",
        "hostname",
        "trojan",
        "pulse submit",
        "url analysis",
        "files",
        "as212913 fop",
        "russia unknown",
        "as397240",
        "as15169 google",
        "as19237 omnis",
        "as22169 omnis",
        "as20068 hawk",
        "as133618",
        "as47846",
        "as22489",
        "encrypt",
        "record value",
        "pragma",
        "accept ch",
        "ireland unknown",
        "msie",
        "chrome",
        "style",
        "gmt setcookie",
        "as6724 strato",
        "core",
        "win32",
        "backdoor",
        "expl",
        "exploit",
        "ipv4",
        "virtool",
        "azorult cnc",
        "possible",
        "as7018 att",
        "regsetvalueexa",
        "china as4134",
        "service",
        "asnone",
        "dns lookup",
        "ransom",
        "push",
        "eternalblue",
        "recon",
        "playgame",
        "domain name",
        "as13768 aptum",
        "meta",
        "error",
        "as43350 nforce",
        "as55286",
        "as60558 phoenix",
        "ip address",
        "registrar",
        "1996",
        "contacted",
        "unlocker",
        "red team",
        "af81 http",
        "execution",
        "open",
        "whois sslcert",
        "suspicious c2",
        "cve202322518",
        "collection",
        "vt graph",
        "excel",
        "emotet",
        "metro",
        "jeffrey reimer pt",
        "sharecare",
        "tsara brashears",
        "apple",
        "icloud"
      ],
      "references": [
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "qbot.zip",
        "imp.fusioninstall.com",
        "https://mylegalbid.com/malwarebytes",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "http://45.159.189.105/bot/regex",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "xhamster.comyouporn.com",
        "cams4all.com",
        "watchhers.net",
        "weconnect.com",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "youramateuporn.com",
        "ns2.abovedomains.com",
        "ww16.porn-community.porn25.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "pirateproxy.cc",
        "mwilliams.dev@gmail.com | piratepages.com",
        "838114.parkingcrew.net",
        "static-push-preprod.porndig.com",
        "www.redtube.comyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "yoursexy.porn | indianyouporn.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "cdn.pornsocket.com",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "www.anyxxxtube.net",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "campaign-manager.sharecare.com",
        "qa.companycam.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "24-70mm.camera",
        "dropboxpayments.com",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "http://xred.mooo.com",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "jimgaffigan.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United Kingdom of Great Britain and Northern Ireland",
        "United States of America",
        "Netherlands",
        "Germany",
        "France"
      ],
      "malware_families": [
        {
          "id": "Adware Affiliate",
          "display_name": "Adware Affiliate",
          "target": null
        },
        {
          "id": "AZORult CnC",
          "display_name": "AZORult CnC",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8134,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 737,
        "FileHash-SHA1": 692,
        "FileHash-SHA256": 7488,
        "URL": 6694,
        "domain": 5247,
        "hostname": 2932,
        "email": 49,
        "CVE": 2,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 23842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "776 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be56d257bb241c4fa3f68d",
      "name": "AZORult CnC",
      "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
      "modified": "2024-03-04T14:03:17.574000",
      "created": "2024-02-03T15:08:02.291000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "whois whois",
        "january",
        "historical ssl",
        "referrer",
        "april",
        "resolutions",
        "siblings domain",
        "march",
        "february",
        "obz4usfn0 http",
        "problems",
        "threat network",
        "infrastructure",
        "st201601152",
        "startpage",
        "iframe",
        "united",
        "unknown",
        "search",
        "showing",
        "united kingdom",
        "creation date",
        "aaaa",
        "cname",
        "scan endpoints",
        "all octoseek",
        "date",
        "next",
        "script urls",
        "soa nxdomain",
        "link",
        "xml title",
        "portugal",
        "domain",
        "status",
        "expiration date",
        "pulse pulses",
        "as44273 host",
        "domain robot",
        "as61969 team",
        "body",
        "as8075",
        "netherlands",
        "servers",
        "emails",
        "duo insight",
        "type",
        "asnone united",
        "name servers",
        "germany unknown",
        "passive dns",
        "as14061",
        "as49453",
        "lowfi",
        "a domains",
        "urls",
        "privacy inc",
        "customer",
        "trojandropper",
        "dynamicloader",
        "default",
        "medium",
        "entries",
        "khtml",
        "download",
        "show",
        "activity",
        "http",
        "copy",
        "write",
        "malware",
        "adware affiliate",
        "hostname",
        "trojan",
        "pulse submit",
        "url analysis",
        "files",
        "as212913 fop",
        "russia unknown",
        "as397240",
        "as15169 google",
        "as19237 omnis",
        "as22169 omnis",
        "as20068 hawk",
        "as133618",
        "as47846",
        "as22489",
        "encrypt",
        "record value",
        "pragma",
        "accept ch",
        "ireland unknown",
        "msie",
        "chrome",
        "style",
        "gmt setcookie",
        "as6724 strato",
        "core",
        "win32",
        "backdoor",
        "expl",
        "exploit",
        "ipv4",
        "virtool",
        "azorult cnc",
        "possible",
        "as7018 att",
        "regsetvalueexa",
        "china as4134",
        "service",
        "asnone",
        "dns lookup",
        "ransom",
        "push",
        "eternalblue",
        "recon",
        "playgame",
        "domain name",
        "as13768 aptum",
        "meta",
        "error",
        "as43350 nforce",
        "as55286",
        "as60558 phoenix",
        "ip address",
        "registrar",
        "1996",
        "contacted",
        "unlocker",
        "red team",
        "af81 http",
        "execution",
        "open",
        "whois sslcert",
        "suspicious c2",
        "cve202322518",
        "collection",
        "vt graph",
        "excel",
        "emotet",
        "metro",
        "jeffrey reimer pt",
        "sharecare",
        "tsara brashears",
        "apple",
        "icloud"
      ],
      "references": [
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "qbot.zip",
        "imp.fusioninstall.com",
        "https://mylegalbid.com/malwarebytes",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "http://45.159.189.105/bot/regex",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "xhamster.comyouporn.com",
        "cams4all.com",
        "watchhers.net",
        "weconnect.com",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "youramateuporn.com",
        "ns2.abovedomains.com",
        "ww16.porn-community.porn25.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "pirateproxy.cc",
        "mwilliams.dev@gmail.com | piratepages.com",
        "838114.parkingcrew.net",
        "static-push-preprod.porndig.com",
        "www.redtube.comyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "yoursexy.porn | indianyouporn.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "cdn.pornsocket.com",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "www.anyxxxtube.net",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "campaign-manager.sharecare.com",
        "qa.companycam.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "24-70mm.camera",
        "dropboxpayments.com",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "http://xred.mooo.com",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "jimgaffigan.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United Kingdom of Great Britain and Northern Ireland",
        "United States of America",
        "Netherlands",
        "Germany",
        "France"
      ],
      "malware_families": [
        {
          "id": "Adware Affiliate",
          "display_name": "Adware Affiliate",
          "target": null
        },
        {
          "id": "AZORult CnC",
          "display_name": "AZORult CnC",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 737,
        "FileHash-SHA1": 692,
        "FileHash-SHA256": 7488,
        "URL": 6694,
        "domain": 5247,
        "hostname": 2932,
        "email": 49,
        "CVE": 2,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 23842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "776 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0cf9b0dac1aa7f9046cf",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:28:25.092000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0d302007152543202bac",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:29:20.375000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 310,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bc0d2518a7ef9bb17df1b9",
      "name": "WannaCry",
      "description": "WannaCry ransomware explained. WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money",
      "modified": "2024-03-02T21:02:32.756000",
      "created": "2024-02-01T21:29:09.832000",
      "tags": [
        "contacted",
        "tsara brashears",
        "urls url",
        "files",
        "pegasus",
        "domains",
        "cellbrite",
        "targets sa",
        "survivor",
        "apple ios",
        "execution",
        "lockbit",
        "malware",
        "core",
        "awful",
        "hacktool",
        "crypto",
        "ransomexx",
        "quasar",
        "asyncrat",
        "bot network",
        "loader",
        "ransomware",
        "wannacry",
        "cryptor",
        "encoder",
        "compiler",
        "win32 dll",
        "pe32",
        "intel",
        "ms windows",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "pe32 compiler",
        "vs98",
        "contained",
        "w english",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "language",
        "overlay",
        "as133618",
        "unknown",
        "cname",
        "united",
        "germany unknown",
        "ukraine unknown",
        "ireland unknown",
        "virgin islands",
        "as47846",
        "as39084 rinet",
        "date",
        "encrypt",
        "next",
        "microsoft visual c++ v6.0",
        "as133618 trellian pty. limited",
        "dynamicloader",
        "high",
        "t1063",
        "yara rule",
        "medium",
        "spoofs",
        "high security",
        "software",
        "discovery",
        "attempts",
        "april",
        "dropper",
        "reads self",
        "bots",
        "connect",
        "botnet",
        "sabey",
        "libel",
        "menacing",
        "brother sabey",
        "as15169 google",
        "aaaa",
        "search",
        "name servers",
        "as29182 jsc",
        "russia unknown",
        "found",
        "error"
      ],
      "references": [
        "https://www.instagram.com/unipegasus_infotech_solutions/?hl=en (dang)",
        "cellebrite.com | enterprise.cellebrite.com",
        "http://pegasus.diskel.co.uk/ | china.pegasus-idc.com | imap.pegasustech.ne",
        "deviceinbox.com",
        "671425187f3ec0da502d2e6b760de93661c1cf5381f81d21c64c6015fbcde2b3",
        "c1a99e3bde9bad27e463c32b96311312.virus",
        "CS Yara rule:WannaCry_Ransomware from ruleset crime_wannacry by Florian Roth (Nextron Systems) (with the help of binar.ly)",
        "CS Yara rule:SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "CS IDS rule: (icmp4) ICMP destination unreachable communication administratively prohibited",
        "CS IDS rule: (port_scan) TCP filtered portsweep",
        "CS IDS rule: (stream_tcp) data sent on stream after TCP reset received",
        "CS IDS rule: ET DROP Spamhaus DROP Listed Traffic Inbound group 14",
        "CS Sigma Rule: Creation of an Executable by an Executable by frack113",
        "Trojan:Win32/WannaCry.350",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Bot Network]",
        "angebot.staude.de",
        "https://otx.alienvault.com/indicator/file/1b7a83a7a35418afa60e88eabcb9fd5a8689700bba20dadb5fbad4e197ce1f1e",
        "https://cura360.com/foldawheel-phoenix-fully-powered-standing-wheelchair?utm_source=google&utm_medium=PLA&gad_source=1&gclid=EAIaIQobChMIw92wtdnigwMVhV9HAR126wDrEAQYASABEgJ_aPD_BwE",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://pin.it/ [Pinterest BotNetwork for Pegasus]",
        "http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/xetetorobezaj.pdf [redirect] http://joshuajenkinslaw.com/uploads/1/3/0/6/130639888/"
      ],
      "public": 1,
      "adversary": "NSO Group - Pegasus",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/WannaCry.350",
          "display_name": "Trojan:Win32/WannaCry.350",
          "target": "/malware/Trojan:Win32/WannaCry.350"
        }
      ],
      "attack_ids": [
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 67,
        "FileHash-SHA1": 62,
        "FileHash-SHA256": 2864,
        "domain": 1401,
        "URL": 5523,
        "hostname": 1766,
        "FilePath": 1,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 11691,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "lostwebtracker.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "lostwebtracker.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622197.7319164
}