{
  "type": "Domain",
  "indicator": "mobapi-help.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/mobapi-help.com",
    "alexa": "http://www.alexa.com/siteinfo/mobapi-help.com",
    "indicator": "mobapi-help.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2217665358,
      "indicator": "mobapi-help.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "69c06ca9341d6c063f652e33",
          "name": "ETERNALBLUE Probe MS17-010 | Wannacry Ransomware Domain - related to NSO Group Pegasus",
          "description": "Quasi governmental, Healthcare Law Firms , legal entities , as well as direct safety threats such as NSO Group Pegasus, Enterprise Cellebrite (in references) and other dangerous intimidation and life endangering tactics directed against a crime victim. Continuous harassment and threats of violence against victims family including 83 yo father. Veteran & hand picked  Sr Systems Analyst and Engineer for Aegis Weapon System Team of 24. You\u2019re welcome America.. Victim left zero evidence with family. Documents shredded. Data stolen by parties named. She isn\u2019t the only one. These people do this for a living. Abuse of Palantir & Foundry tools.",
          "modified": "2026-03-22T22:26:49.205000",
          "created": "2026-03-22T22:26:49.205000",
          "tags": [
            "ransomware",
            "united",
            "search",
            "asnone",
            "regsetvalueexa",
            "service",
            "regdword",
            "medium",
            "get na",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "playgame",
            "unknown",
            "exploit",
            "cve",
            "wncry",
            "wannacry",
            "passive dns",
            "urls",
            "british virgin",
            "all url",
            "http",
            "ip address",
            "related nids",
            "files location",
            "virgin islands",
            "islands",
            "bgp",
            "virgin islands",
            "hijacked",
            "data upload",
            "extraction",
            "failed",
            "review iocs",
            "include ovo",
            "tovary review",
            "ids detec",
            "yara dete",
            "trior texarag",
            "drop or",
            "rrowse",
            "type",
            "extra data",
            "hurricane electric",
            "p2404",
            "p11629470400",
            "p11629107633",
            "artifacts v",
            "full reports",
            "v help",
            "info",
            "low l",
            "high ta0002",
            "techniques",
            "t1053",
            "command",
            "scripting inte",
            "low ta0003",
            "techniques high",
            "t1053 ite",
            "modify system",
            "pl t1543",
            "boot",
            "logon autostart",
            "ex t1547",
            "checks-disk-space",
            "checks-network-adapters",
            "detect-debug-environment",
            "direct-cpu-clock-access",
            "long-sleeps",
            "runtime-modules",
            "get http",
            "head http",
            "dns resolutions",
            "ip traffic",
            "53 tcp",
            "tls sni",
            "apple id",
            "webdisk",
            "expiration",
            "url http",
            "hostname",
            "no expiration",
            "iocs",
            "url https",
            "es included",
            "win32 exe",
            "pe32 executable",
            "ms windows",
            "intel",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "t1204 user",
            "defense evasion",
            "over",
            "mitre att",
            "ck matrix",
            "ascii text",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "javascript",
            "ssl certificate",
            "encrypt",
            "accept",
            "russia unknown",
            "meta",
            "record value",
            "aaaa",
            "link",
            "present jun",
            "apple",
            "remote access",
            "otx logo",
            "all ipv4",
            "url analysis",
            "files",
            "accept ch",
            "present dec",
            "content type",
            "x pcrew",
            "name servers",
            "present may",
            "body doctype",
            "title",
            "all domain",
            "servers",
            "china unknown",
            "found content",
            "gmt p3p",
            "cp oti",
            "dsp cor",
            "iva our",
            "ind com",
            "domain",
            "cname",
            "entries",
            "brian sabey",
            "hallrender",
            "christopher ahmann",
            "t1480 execution",
            "discovery att",
            "heur",
            "virtool",
            "win64",
            "mtb win32",
            "backdoor",
            "location china",
            "hangzhou",
            "china asn",
            "ransom",
            "wannadecryptor",
            "filehash",
            "yara detections",
            "msvisualcpp60",
            "related tags",
            "none file",
            "type pexe",
            "copy",
            "beginstring",
            "null",
            "refresh",
            "body",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "expl",
            "unknown cname",
            "hacktool",
            "domain address",
            "contacted hosts",
            "process details",
            "flag",
            "ipv4 add",
            "location united",
            "america flag",
            "exploit",
            "show",
            "all filehash",
            "expiration date",
            "gmt location",
            "gmt max",
            "domain add",
            "elite",
            "date",
            "cowboy",
            "United States",
            "present feb",
            "present oct",
            "creation date",
            "present nov",
            "moved",
            "emails"
          ],
          "references": [
            "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
            "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
            "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
            "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
            "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
            "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
            "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
            "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
            "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
            "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
            "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
            "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
            "Alerts:  peid_packer pe_unknown_resource_name",
            "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
            "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
            "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
            "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
            "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
            "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
            "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
            "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
            "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
            "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
            "apple.com-verify.account.manage.test2.aptaforum.com.cn",
            "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
            "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
            "web-secure-appleid-login.com.test2.aptaforum.com.cn",
            "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
            "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
            "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
            "findmy.apple-uk.live",
            "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
            "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
            "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
            "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
            "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
            "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
            "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
            "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
            "KeenDNS | keendnsaclremote805717135272048.qeenetic.link",
            "https://fonts.googleapis.com/css",
            "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
            "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless",
            "www.remoteaccess.allied-media.com",
            "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
            "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
            "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
            "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
            "dns17.hichina.com",
            "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
            "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
            "https://otx.alienvault.com/indicator/domain/qeenetic.link",
            "okg.and.googletagmanagers.com",
            "pcy.and.googletagmanagers.com",
            "pgj.and.googletagmanagers.com",
            "prb.and.googletagmanagers.com",
            "lkp.and.googletagmanagers.com",
            "jgw.and.googletagmanagers.com",
            "bzx.and.googletagmanagers.com",
            "msedge.b.tlu.dl.delivery.mp.microsoft.com",
            "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
            "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
            "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
            "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
            "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
            "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
            "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
            "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
            "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Win.Ransomware.WannaCry-6313787-0",
              "display_name": "Win.Ransomware.WannaCry-6313787-0",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147.A",
              "display_name": "Exploit:Win32/CVE-2017-0147.A",
              "target": "/malware/Exploit:Win32/CVE-2017-0147.A"
            },
            {
              "id": "Trojan/JS.Redirector.QNO",
              "display_name": "Trojan/JS.Redirector.QNO",
              "target": null
            },
            {
              "id": "Win.Trojan.Application-1955.",
              "display_name": "Win.Trojan.Application-1955.",
              "target": null
            },
            {
              "id": "Win32:Banker-LAA\\ [Trj]",
              "display_name": "Win32:Banker-LAA\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Malware.Snojan-6775202-0",
              "display_name": "Win.Malware.Snojan-6775202-0",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Trj]",
              "display_name": "Win32:Evo-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win64:Expiro-AJ\\ [Inf]",
              "display_name": "Win64:Expiro-AJ\\ [Inf]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fugrafa-9733007-0",
              "display_name": "Win.Trojan.Fugrafa-9733007-0",
              "target": null
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6989114-0",
              "display_name": "Win.Trojan.VBGeneric-6989114-0",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.YA!MTB",
              "display_name": "VirTool:Win32/VBInject.YA!MTB",
              "target": "/malware/VirTool:Win32/VBInject.YA!MTB"
            },
            {
              "id": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
              "display_name": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator",
              "display_name": "#VirTool:Win32/Obfuscator",
              "target": "/malware/#VirTool:Win32/Obfuscator"
            },
            {
              "id": "Backdoor:Win32/Small.IR",
              "display_name": "Backdoor:Win32/Small.IR",
              "target": "/malware/Backdoor:Win32/Small.IR"
            },
            {
              "id": "Win64:Expiro-AJ\\ [Inf]",
              "display_name": "Win64:Expiro-AJ\\ [Inf]",
              "target": null
            },
            {
              "id": "Win32:Dh-A\\",
              "display_name": "Win32:Dh-A\\",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147.A",
              "display_name": "Ransom:Win32/CVE-2017-0147.A",
              "target": "/malware/Ransom:Win32/CVE-2017-0147.A"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Malware.Flystudio-6738927-0",
              "display_name": "Win.Malware.Flystudio-6738927-0",
              "target": null
            },
            {
              "id": "ALF:SpikeAexR.PEVPOPC",
              "display_name": "ALF:SpikeAexR.PEVPOPC",
              "target": null
            },
            {
              "id": "Sf:WNCryLdr-A\\ [Trj]",
              "display_name": "Sf:WNCryLdr-A\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Ransomware.WannaCry-6313787-0",
              "display_name": "Win.Ransomware.WannaCry-6313787-0",
              "target": null
            },
            {
              "id": "ransom:Win32/WannaCrypt.H",
              "display_name": "ransom:Win32/WannaCrypt.H",
              "target": "/malware/ransom:Win32/WannaCrypt.H"
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1198",
              "name": "SIP and Trust Provider Hijacking",
              "display_name": "T1198 - SIP and Trust Provider Hijacking"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1543.001",
              "name": "Launch Agent",
              "display_name": "T1543.001 - Launch Agent"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            }
          ],
          "industries": [
            "Government",
            "Legal",
            "Technology",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3779,
            "FileHash-MD5": 422,
            "FileHash-SHA1": 411,
            "FileHash-SHA256": 1824,
            "IPv4": 666,
            "domain": 979,
            "hostname": 2082,
            "CVE": 1,
            "BitcoinAddress": 3,
            "SSLCertFingerprint": 6,
            "email": 8
          },
          "indicator_count": 10181,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "28 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6894f30905efa56990bb10f6",
          "name": "Expanded device-local-****remotewd.com",
          "description": "device-local-2ffdbd74-9f90-41fa-beb8-454ed65788c5.remotewd.com",
          "modified": "2025-09-06T06:03:31.462000",
          "created": "2025-08-07T18:40:09.876000",
          "tags": [
            "hostname",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "nameservers",
            "date hash",
            "avast avg",
            "entries",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "itre att",
            "ck techniques",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "domain",
            "hostname add",
            "files ip",
            "address",
            "location united",
            "hash avast",
            "avg clamav",
            "msdefender aug",
            "united",
            "port",
            "destination",
            "as16509",
            "search",
            "unknown",
            "ocloudflare",
            "medium",
            "memcommit",
            "service",
            "write",
            "next",
            "persistence",
            "execution",
            "malware",
            "copy",
            "encrypt",
            "win32",
            "mtb feb",
            "trojan",
            "susp",
            "trojandropper",
            "msr feb",
            "trojanspy",
            "next associated",
            "urls show",
            "date checked",
            "virtool",
            "win64",
            "worm",
            "mtb may",
            "files show",
            "heur",
            "script",
            "dropper",
            "ransom",
            "vitro",
            "pe32",
            "intel",
            "ms windows",
            "as15169",
            "read c",
            "asnone",
            "show",
            "packing t1045",
            "t1045",
            "delphi",
            "code",
            "june"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 6741,
            "domain": 5822,
            "FileHash-SHA256": 1550,
            "URL": 16348,
            "FileHash-MD5": 287,
            "FileHash-SHA1": 242,
            "SSLCertFingerprint": 9,
            "email": 1
          },
          "indicator_count": 31000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6894f4e6c41982f405592b55",
          "name": "Worm:Win32/Mydoom | Expanded device-local-****remotewd.com",
          "description": "",
          "modified": "2025-09-06T06:03:31.462000",
          "created": "2025-08-07T18:48:06.557000",
          "tags": [
            "hostname",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "nameservers",
            "date hash",
            "avast avg",
            "entries",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "itre att",
            "ck techniques",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "domain",
            "hostname add",
            "files ip",
            "address",
            "location united",
            "hash avast",
            "avg clamav",
            "msdefender aug",
            "united",
            "port",
            "destination",
            "as16509",
            "search",
            "unknown",
            "ocloudflare",
            "medium",
            "memcommit",
            "service",
            "write",
            "next",
            "persistence",
            "execution",
            "malware",
            "copy",
            "encrypt",
            "win32",
            "mtb feb",
            "trojan",
            "susp",
            "trojandropper",
            "msr feb",
            "trojanspy",
            "next associated",
            "urls show",
            "date checked",
            "virtool",
            "win64",
            "worm",
            "mtb may",
            "files show",
            "heur",
            "script",
            "dropper",
            "ransom",
            "vitro",
            "pe32",
            "intel",
            "ms windows",
            "as15169",
            "read c",
            "asnone",
            "show",
            "packing t1045",
            "t1045",
            "delphi",
            "code",
            "june"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6894f30905efa56990bb10f6",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 6741,
            "domain": 5822,
            "FileHash-SHA256": 1550,
            "URL": 16348,
            "FileHash-MD5": 287,
            "FileHash-SHA1": 242,
            "SSLCertFingerprint": 9,
            "email": 1
          },
          "indicator_count": 31000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68923ea4efbf58b7ba48acec",
          "name": "Hosted App",
          "description": "",
          "modified": "2025-09-04T16:03:17.037000",
          "created": "2025-08-05T17:25:56.454000",
          "tags": [
            "issuer wr3",
            "log id",
            "gmtn",
            "abn timestamp",
            "ad180b80",
            "full name",
            "extensionsstr",
            "web server",
            "ca issuers",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "spawns",
            "mitre att",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "ascii text",
            "pattern match",
            "show technique",
            "date",
            "format",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "flag",
            "usa windows",
            "hwp support",
            "march",
            "december",
            "united",
            "markmonitor",
            "overview dns",
            "requests domain",
            "country",
            "contacted hosts",
            "ip address",
            "process details",
            "t1179 hooking",
            "access windows",
            "installs",
            "control att",
            "found",
            "development att",
            "name server",
            "show process",
            "programfiles",
            "command decode",
            "suricata ipv4",
            "ck matrix",
            "comspec",
            "model",
            "general",
            "dynamicloader",
            "unknown",
            "as16509",
            "whitelisted",
            "medium",
            "write c",
            "as15169",
            "search",
            "high",
            "write",
            "android",
            "malware",
            "copy",
            "next",
            "formbook cnc",
            "checkin",
            "entries",
            "passive dns",
            "next associated",
            "site",
            "neue",
            "ipv4",
            "pulse pulses",
            "exploit",
            "trojan",
            "virtool",
            "body",
            "refer",
            "present dec",
            "epub",
            "present jan",
            "present nov",
            "present oct",
            "showing",
            "urls show",
            "win32",
            "win64",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "prefetch8",
            "localappdata",
            "prefetch1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3409,
            "hostname": 4127,
            "URL": 8408,
            "SSLCertFingerprint": 9,
            "FileHash-SHA256": 1175,
            "FileHash-MD5": 144,
            "FileHash-SHA1": 134,
            "CVE": 2
          },
          "indicator_count": 17408,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "228 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "687c07591d641de3c896d4a9",
          "name": "icon.palantirfoundry.com - Brazzers Porn",
          "description": "Another strange pulse. Persistent bad actors moved and changed name of operation; of course. Usual - Hostname\nicon.palantirfoundry.com , Apple, Samsung , X.com , Twitter , Facebook, Google, Palantir NSA or a poser? I was threatened this week, I was told that if I was on the \u2018list\u2019 they have to do anything that is asked including \u2018blow me up\u2019. Sounds nuts but I can\u2019t believe this. Whoever has been doing this is hyper dangerous.\n\nicon.palantirfoundry.com ?  P.S. Huge pulse. Can\u2019t use private option to cherry pick the IoC\u2019s I\u2019d like to breakdown. Have I broken a rule?",
          "modified": "2025-08-18T18:01:11.130000",
          "created": "2025-07-19T21:00:09.343000",
          "tags": [
            "canada unknown",
            "passive dns",
            "ransom",
            "entries",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "reverse dns",
            "united",
            "unknown ns",
            "moved",
            "ip address",
            "creation date",
            "search",
            "omain",
            "pulse pulses",
            "body",
            "date",
            "showing",
            "domain",
            "hostname",
            "ocloudflare",
            "stca",
            "lsan francisco",
            "ecc ca3",
            "ecc ca2",
            "as16509",
            "unknown",
            "ms windows",
            "encrypt",
            "write",
            "next",
            "service",
            "malware",
            "copy",
            "unknown soa",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jul",
            "present jan",
            "medium",
            "memcommit",
            "module load",
            "t1129",
            "regopenkeyexw",
            "fjlsedauv",
            "et useragents",
            "go http",
            "registry run",
            "persistence",
            "execution",
            "checks",
            "keys",
            "start folder",
            "richhash",
            "external",
            "virustotal api",
            "screenshots",
            "find",
            "show",
            "types",
            "seard type",
            "indicator",
            "data upload",
            "extraction",
            "failed",
            "sc data",
            "type",
            "extri included",
            "review data",
            "sugges data",
            "find suxxesteu",
            "typ indicalon"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 62,
            "FileHash-SHA1": 17,
            "FileHash-SHA256": 1433,
            "URL": 10188,
            "hostname": 5658,
            "domain": 5753,
            "email": 4,
            "SSLCertFingerprint": 20
          },
          "indicator_count": 23135,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "245 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://fonts.googleapis.com/css",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
        "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
        "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
        "KeenDNS | keendnsaclremote805717135272048.qeenetic.link",
        "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
        "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
        "bzx.and.googletagmanagers.com",
        "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
        "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
        "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
        "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
        "web-secure-appleid-login.com.test2.aptaforum.com.cn",
        "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
        "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
        "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
        "dns17.hichina.com",
        "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
        "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
        "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
        "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
        "findmy.apple-uk.live",
        "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
        "msedge.b.tlu.dl.delivery.mp.microsoft.com",
        "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72",
        "jgw.and.googletagmanagers.com",
        "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
        "apple.com-verify.account.manage.test2.aptaforum.com.cn",
        "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
        "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
        "Alerts:  peid_packer pe_unknown_resource_name",
        "www.remoteaccess.allied-media.com",
        "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
        "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
        "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
        "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
        "prb.and.googletagmanagers.com",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
        "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
        "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
        "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
        "pgj.and.googletagmanagers.com",
        "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
        "pcy.and.googletagmanagers.com",
        "lkp.and.googletagmanagers.com",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
        "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
        "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
        "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
        "okg.and.googletagmanagers.com",
        "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
        "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
        "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
        "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
        "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
        "https://otx.alienvault.com/indicator/domain/qeenetic.link",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
        "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.snojan-6775202-0",
            "Win.trojan.fugrafa-9733007-0",
            "Win32:trojanx-gen\\ [trj]",
            "Win32:dh-a\\",
            "Win.malware.flystudio-6738927-0",
            "Sf:wncryldr-a\\ [trj]",
            "Win32:malware-gen",
            "Virtool:win32/vbinject.ya!mtb",
            "#virtool:win32/obfuscator",
            "Cve-2017-0147",
            "Exploit:win32/cve-2017-0147.a",
            "Backdoor:win32/small.ir",
            "Trojan/js.redirector.qno",
            "Win32:dh-a\\ [win32:fileinfector-c\\ [heur]",
            "Win.trojan.application-1955.",
            "Ransom:win32/wannacrypt.h",
            "Ransomware",
            "Win32:banker-laa\\ [trj]",
            "Alf:spikeaexr.pevpopc",
            "Win64:expiro-aj\\ [inf]",
            "Win32:evo-gen\\ [trj]",
            "Win.ransomware.wannacry-6313787-0",
            "Ransom:win32/cve-2017-0147.a",
            "Win.trojan.vbgeneric-6989114-0"
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government",
            "Technology"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "69c06ca9341d6c063f652e33",
      "name": "ETERNALBLUE Probe MS17-010 | Wannacry Ransomware Domain - related to NSO Group Pegasus",
      "description": "Quasi governmental, Healthcare Law Firms , legal entities , as well as direct safety threats such as NSO Group Pegasus, Enterprise Cellebrite (in references) and other dangerous intimidation and life endangering tactics directed against a crime victim. Continuous harassment and threats of violence against victims family including 83 yo father. Veteran & hand picked  Sr Systems Analyst and Engineer for Aegis Weapon System Team of 24. You\u2019re welcome America.. Victim left zero evidence with family. Documents shredded. Data stolen by parties named. She isn\u2019t the only one. These people do this for a living. Abuse of Palantir & Foundry tools.",
      "modified": "2026-03-22T22:26:49.205000",
      "created": "2026-03-22T22:26:49.205000",
      "tags": [
        "ransomware",
        "united",
        "search",
        "asnone",
        "regsetvalueexa",
        "service",
        "regdword",
        "medium",
        "get na",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "playgame",
        "unknown",
        "exploit",
        "cve",
        "wncry",
        "wannacry",
        "passive dns",
        "urls",
        "british virgin",
        "all url",
        "http",
        "ip address",
        "related nids",
        "files location",
        "virgin islands",
        "islands",
        "bgp",
        "virgin islands",
        "hijacked",
        "data upload",
        "extraction",
        "failed",
        "review iocs",
        "include ovo",
        "tovary review",
        "ids detec",
        "yara dete",
        "trior texarag",
        "drop or",
        "rrowse",
        "type",
        "extra data",
        "hurricane electric",
        "p2404",
        "p11629470400",
        "p11629107633",
        "artifacts v",
        "full reports",
        "v help",
        "info",
        "low l",
        "high ta0002",
        "techniques",
        "t1053",
        "command",
        "scripting inte",
        "low ta0003",
        "techniques high",
        "t1053 ite",
        "modify system",
        "pl t1543",
        "boot",
        "logon autostart",
        "ex t1547",
        "checks-disk-space",
        "checks-network-adapters",
        "detect-debug-environment",
        "direct-cpu-clock-access",
        "long-sleeps",
        "runtime-modules",
        "get http",
        "head http",
        "dns resolutions",
        "ip traffic",
        "53 tcp",
        "tls sni",
        "apple id",
        "webdisk",
        "expiration",
        "url http",
        "hostname",
        "no expiration",
        "iocs",
        "url https",
        "es included",
        "win32 exe",
        "pe32 executable",
        "ms windows",
        "intel",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "t1204 user",
        "defense evasion",
        "over",
        "mitre att",
        "ck matrix",
        "ascii text",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "javascript",
        "ssl certificate",
        "encrypt",
        "accept",
        "russia unknown",
        "meta",
        "record value",
        "aaaa",
        "link",
        "present jun",
        "apple",
        "remote access",
        "otx logo",
        "all ipv4",
        "url analysis",
        "files",
        "accept ch",
        "present dec",
        "content type",
        "x pcrew",
        "name servers",
        "present may",
        "body doctype",
        "title",
        "all domain",
        "servers",
        "china unknown",
        "found content",
        "gmt p3p",
        "cp oti",
        "dsp cor",
        "iva our",
        "ind com",
        "domain",
        "cname",
        "entries",
        "brian sabey",
        "hallrender",
        "christopher ahmann",
        "t1480 execution",
        "discovery att",
        "heur",
        "virtool",
        "win64",
        "mtb win32",
        "backdoor",
        "location china",
        "hangzhou",
        "china asn",
        "ransom",
        "wannadecryptor",
        "filehash",
        "yara detections",
        "msvisualcpp60",
        "related tags",
        "none file",
        "type pexe",
        "copy",
        "beginstring",
        "null",
        "refresh",
        "body",
        "span",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "expl",
        "unknown cname",
        "hacktool",
        "domain address",
        "contacted hosts",
        "process details",
        "flag",
        "ipv4 add",
        "location united",
        "america flag",
        "exploit",
        "show",
        "all filehash",
        "expiration date",
        "gmt location",
        "gmt max",
        "domain add",
        "elite",
        "date",
        "cowboy",
        "United States",
        "present feb",
        "present oct",
        "creation date",
        "present nov",
        "moved",
        "emails"
      ],
      "references": [
        "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
        "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
        "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
        "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
        "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
        "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
        "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
        "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
        "Alerts:  peid_packer pe_unknown_resource_name",
        "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
        "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
        "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
        "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
        "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
        "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "apple.com-verify.account.manage.test2.aptaforum.com.cn",
        "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
        "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
        "web-secure-appleid-login.com.test2.aptaforum.com.cn",
        "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
        "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
        "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
        "findmy.apple-uk.live",
        "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
        "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
        "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
        "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
        "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
        "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
        "KeenDNS | keendnsaclremote805717135272048.qeenetic.link",
        "https://fonts.googleapis.com/css",
        "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
        "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless",
        "www.remoteaccess.allied-media.com",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
        "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
        "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
        "dns17.hichina.com",
        "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
        "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
        "https://otx.alienvault.com/indicator/domain/qeenetic.link",
        "okg.and.googletagmanagers.com",
        "pcy.and.googletagmanagers.com",
        "pgj.and.googletagmanagers.com",
        "prb.and.googletagmanagers.com",
        "lkp.and.googletagmanagers.com",
        "jgw.and.googletagmanagers.com",
        "bzx.and.googletagmanagers.com",
        "msedge.b.tlu.dl.delivery.mp.microsoft.com",
        "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
        "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
        "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
        "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
        "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Win.Ransomware.WannaCry-6313787-0",
          "display_name": "Win.Ransomware.WannaCry-6313787-0",
          "target": null
        },
        {
          "id": "Exploit:Win32/CVE-2017-0147.A",
          "display_name": "Exploit:Win32/CVE-2017-0147.A",
          "target": "/malware/Exploit:Win32/CVE-2017-0147.A"
        },
        {
          "id": "Trojan/JS.Redirector.QNO",
          "display_name": "Trojan/JS.Redirector.QNO",
          "target": null
        },
        {
          "id": "Win.Trojan.Application-1955.",
          "display_name": "Win.Trojan.Application-1955.",
          "target": null
        },
        {
          "id": "Win32:Banker-LAA\\ [Trj]",
          "display_name": "Win32:Banker-LAA\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Malware.Snojan-6775202-0",
          "display_name": "Win.Malware.Snojan-6775202-0",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Trj]",
          "display_name": "Win32:Evo-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win64:Expiro-AJ\\ [Inf]",
          "display_name": "Win64:Expiro-AJ\\ [Inf]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fugrafa-9733007-0",
          "display_name": "Win.Trojan.Fugrafa-9733007-0",
          "target": null
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6989114-0",
          "display_name": "Win.Trojan.VBGeneric-6989114-0",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.YA!MTB",
          "display_name": "VirTool:Win32/VBInject.YA!MTB",
          "target": "/malware/VirTool:Win32/VBInject.YA!MTB"
        },
        {
          "id": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
          "display_name": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator",
          "display_name": "#VirTool:Win32/Obfuscator",
          "target": "/malware/#VirTool:Win32/Obfuscator"
        },
        {
          "id": "Backdoor:Win32/Small.IR",
          "display_name": "Backdoor:Win32/Small.IR",
          "target": "/malware/Backdoor:Win32/Small.IR"
        },
        {
          "id": "Win64:Expiro-AJ\\ [Inf]",
          "display_name": "Win64:Expiro-AJ\\ [Inf]",
          "target": null
        },
        {
          "id": "Win32:Dh-A\\",
          "display_name": "Win32:Dh-A\\",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147.A",
          "display_name": "Ransom:Win32/CVE-2017-0147.A",
          "target": "/malware/Ransom:Win32/CVE-2017-0147.A"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win.Malware.Flystudio-6738927-0",
          "display_name": "Win.Malware.Flystudio-6738927-0",
          "target": null
        },
        {
          "id": "ALF:SpikeAexR.PEVPOPC",
          "display_name": "ALF:SpikeAexR.PEVPOPC",
          "target": null
        },
        {
          "id": "Sf:WNCryLdr-A\\ [Trj]",
          "display_name": "Sf:WNCryLdr-A\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Ransomware.WannaCry-6313787-0",
          "display_name": "Win.Ransomware.WannaCry-6313787-0",
          "target": null
        },
        {
          "id": "ransom:Win32/WannaCrypt.H",
          "display_name": "ransom:Win32/WannaCrypt.H",
          "target": "/malware/ransom:Win32/WannaCrypt.H"
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1198",
          "name": "SIP and Trust Provider Hijacking",
          "display_name": "T1198 - SIP and Trust Provider Hijacking"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1543.001",
          "name": "Launch Agent",
          "display_name": "T1543.001 - Launch Agent"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        }
      ],
      "industries": [
        "Government",
        "Legal",
        "Technology",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3779,
        "FileHash-MD5": 422,
        "FileHash-SHA1": 411,
        "FileHash-SHA256": 1824,
        "IPv4": 666,
        "domain": 979,
        "hostname": 2082,
        "CVE": 1,
        "BitcoinAddress": 3,
        "SSLCertFingerprint": 6,
        "email": 8
      },
      "indicator_count": 10181,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "28 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6894f30905efa56990bb10f6",
      "name": "Expanded device-local-****remotewd.com",
      "description": "device-local-2ffdbd74-9f90-41fa-beb8-454ed65788c5.remotewd.com",
      "modified": "2025-09-06T06:03:31.462000",
      "created": "2025-08-07T18:40:09.876000",
      "tags": [
        "hostname",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "nameservers",
        "date hash",
        "avast avg",
        "entries",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "itre att",
        "ck techniques",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "date",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "domain",
        "hostname add",
        "files ip",
        "address",
        "location united",
        "hash avast",
        "avg clamav",
        "msdefender aug",
        "united",
        "port",
        "destination",
        "as16509",
        "search",
        "unknown",
        "ocloudflare",
        "medium",
        "memcommit",
        "service",
        "write",
        "next",
        "persistence",
        "execution",
        "malware",
        "copy",
        "encrypt",
        "win32",
        "mtb feb",
        "trojan",
        "susp",
        "trojandropper",
        "msr feb",
        "trojanspy",
        "next associated",
        "urls show",
        "date checked",
        "virtool",
        "win64",
        "worm",
        "mtb may",
        "files show",
        "heur",
        "script",
        "dropper",
        "ransom",
        "vitro",
        "pe32",
        "intel",
        "ms windows",
        "as15169",
        "read c",
        "asnone",
        "show",
        "packing t1045",
        "t1045",
        "delphi",
        "code",
        "june"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 6741,
        "domain": 5822,
        "FileHash-SHA256": 1550,
        "URL": 16348,
        "FileHash-MD5": 287,
        "FileHash-SHA1": 242,
        "SSLCertFingerprint": 9,
        "email": 1
      },
      "indicator_count": 31000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6894f4e6c41982f405592b55",
      "name": "Worm:Win32/Mydoom | Expanded device-local-****remotewd.com",
      "description": "",
      "modified": "2025-09-06T06:03:31.462000",
      "created": "2025-08-07T18:48:06.557000",
      "tags": [
        "hostname",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "nameservers",
        "date hash",
        "avast avg",
        "entries",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "itre att",
        "ck techniques",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "date",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "domain",
        "hostname add",
        "files ip",
        "address",
        "location united",
        "hash avast",
        "avg clamav",
        "msdefender aug",
        "united",
        "port",
        "destination",
        "as16509",
        "search",
        "unknown",
        "ocloudflare",
        "medium",
        "memcommit",
        "service",
        "write",
        "next",
        "persistence",
        "execution",
        "malware",
        "copy",
        "encrypt",
        "win32",
        "mtb feb",
        "trojan",
        "susp",
        "trojandropper",
        "msr feb",
        "trojanspy",
        "next associated",
        "urls show",
        "date checked",
        "virtool",
        "win64",
        "worm",
        "mtb may",
        "files show",
        "heur",
        "script",
        "dropper",
        "ransom",
        "vitro",
        "pe32",
        "intel",
        "ms windows",
        "as15169",
        "read c",
        "asnone",
        "show",
        "packing t1045",
        "t1045",
        "delphi",
        "code",
        "june"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6894f30905efa56990bb10f6",
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 6741,
        "domain": 5822,
        "FileHash-SHA256": 1550,
        "URL": 16348,
        "FileHash-MD5": 287,
        "FileHash-SHA1": 242,
        "SSLCertFingerprint": 9,
        "email": 1
      },
      "indicator_count": 31000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68923ea4efbf58b7ba48acec",
      "name": "Hosted App",
      "description": "",
      "modified": "2025-09-04T16:03:17.037000",
      "created": "2025-08-05T17:25:56.454000",
      "tags": [
        "issuer wr3",
        "log id",
        "gmtn",
        "abn timestamp",
        "ad180b80",
        "full name",
        "extensionsstr",
        "web server",
        "ca issuers",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "spawns",
        "mitre att",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "ascii text",
        "pattern match",
        "show technique",
        "date",
        "format",
        "august",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "flag",
        "usa windows",
        "hwp support",
        "march",
        "december",
        "united",
        "markmonitor",
        "overview dns",
        "requests domain",
        "country",
        "contacted hosts",
        "ip address",
        "process details",
        "t1179 hooking",
        "access windows",
        "installs",
        "control att",
        "found",
        "development att",
        "name server",
        "show process",
        "programfiles",
        "command decode",
        "suricata ipv4",
        "ck matrix",
        "comspec",
        "model",
        "general",
        "dynamicloader",
        "unknown",
        "as16509",
        "whitelisted",
        "medium",
        "write c",
        "as15169",
        "search",
        "high",
        "write",
        "android",
        "malware",
        "copy",
        "next",
        "formbook cnc",
        "checkin",
        "entries",
        "passive dns",
        "next associated",
        "site",
        "neue",
        "ipv4",
        "pulse pulses",
        "exploit",
        "trojan",
        "virtool",
        "body",
        "refer",
        "present dec",
        "epub",
        "present jan",
        "present nov",
        "present oct",
        "showing",
        "urls show",
        "win32",
        "win64",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "prefetch8",
        "localappdata",
        "prefetch1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 3409,
        "hostname": 4127,
        "URL": 8408,
        "SSLCertFingerprint": 9,
        "FileHash-SHA256": 1175,
        "FileHash-MD5": 144,
        "FileHash-SHA1": 134,
        "CVE": 2
      },
      "indicator_count": 17408,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "228 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "687c07591d641de3c896d4a9",
      "name": "icon.palantirfoundry.com - Brazzers Porn",
      "description": "Another strange pulse. Persistent bad actors moved and changed name of operation; of course. Usual - Hostname\nicon.palantirfoundry.com , Apple, Samsung , X.com , Twitter , Facebook, Google, Palantir NSA or a poser? I was threatened this week, I was told that if I was on the \u2018list\u2019 they have to do anything that is asked including \u2018blow me up\u2019. Sounds nuts but I can\u2019t believe this. Whoever has been doing this is hyper dangerous.\n\nicon.palantirfoundry.com ?  P.S. Huge pulse. Can\u2019t use private option to cherry pick the IoC\u2019s I\u2019d like to breakdown. Have I broken a rule?",
      "modified": "2025-08-18T18:01:11.130000",
      "created": "2025-07-19T21:00:09.343000",
      "tags": [
        "canada unknown",
        "passive dns",
        "ransom",
        "entries",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "reverse dns",
        "united",
        "unknown ns",
        "moved",
        "ip address",
        "creation date",
        "search",
        "omain",
        "pulse pulses",
        "body",
        "date",
        "showing",
        "domain",
        "hostname",
        "ocloudflare",
        "stca",
        "lsan francisco",
        "ecc ca3",
        "ecc ca2",
        "as16509",
        "unknown",
        "ms windows",
        "encrypt",
        "write",
        "next",
        "service",
        "malware",
        "copy",
        "unknown soa",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jul",
        "present jan",
        "medium",
        "memcommit",
        "module load",
        "t1129",
        "regopenkeyexw",
        "fjlsedauv",
        "et useragents",
        "go http",
        "registry run",
        "persistence",
        "execution",
        "checks",
        "keys",
        "start folder",
        "richhash",
        "external",
        "virustotal api",
        "screenshots",
        "find",
        "show",
        "types",
        "seard type",
        "indicator",
        "data upload",
        "extraction",
        "failed",
        "sc data",
        "type",
        "extri included",
        "review data",
        "sugges data",
        "find suxxesteu",
        "typ indicalon"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 62,
        "FileHash-SHA1": 17,
        "FileHash-SHA256": 1433,
        "URL": 10188,
        "hostname": 5658,
        "domain": 5753,
        "email": 4,
        "SSLCertFingerprint": 20
      },
      "indicator_count": 23135,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "245 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "mobapi-help.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "mobapi-help.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776716051.876034
}