{
  "type": "Domain",
  "indicator": "papichconstructions.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/papichconstructions.com",
    "alexa": "http://www.alexa.com/siteinfo/papichconstructions.com",
    "indicator": "papichconstructions.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3334190318,
      "indicator": "papichconstructions.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69e30ffa710fafb6d651ca89",
          "name": "Kelowna detachment - British Columbia by streamminingex",
          "description": "",
          "modified": "2026-04-18T05:46:36.582000",
          "created": "2026-04-18T05:00:42.166000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6570a552ac0b6570454709f7",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 15,
            "URL": 1354,
            "FileHash-MD5": 1308,
            "FileHash-SHA1": 1314,
            "FileHash-SHA256": 4898,
            "hostname": 1401,
            "email": 62,
            "domain": 1239,
            "CIDR": 8
          },
          "indicator_count": 11599,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e30ffde212f52470137868",
          "name": "Kelowna detachment - British Columbia by streamminingex",
          "description": "",
          "modified": "2026-04-18T05:46:26.897000",
          "created": "2026-04-18T05:00:45.780000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6570a552ac0b6570454709f7",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 15,
            "URL": 1358,
            "FileHash-MD5": 1308,
            "FileHash-SHA1": 1314,
            "FileHash-SHA256": 4898,
            "hostname": 1405,
            "email": 62,
            "domain": 1242,
            "CIDR": 8
          },
          "indicator_count": 11610,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b2b76c9a490b69b6a085b3",
          "name": "Exodus/cellbrite clone by Q Vashti",
          "description": "",
          "modified": "2026-03-12T12:54:04.160000",
          "created": "2026-03-12T12:54:04.160000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6916e098df39114161354b23",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4295,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3255,
            "domain": 2911,
            "hostname": 2894,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13986,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "39 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a9e7c572b8411d126215a6",
          "name": "@scoreblue callback clone",
          "description": "",
          "modified": "2026-03-06T05:11:18.020000",
          "created": "2026-03-05T20:29:57.169000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b8a052c4160dbd76054f8a",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3267,
            "domain": 1459,
            "hostname": 1268,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9172,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "45 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6952febb1dbcf05ee601f050",
          "name": "Pegasus Ongoing l Cellbrite | Exodus | Brian Sabey | HallRender | Tulach (1.29.24)",
          "description": "",
          "modified": "2025-12-29T22:20:43.238000",
          "created": "2025-12-29T22:20:43.238000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b80a20bbcd0eb305a740ec",
          "export_count": 29402,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4101,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3155,
            "domain": 2894,
            "hostname": 2847,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13628,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "112 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69458259401a612102d02679",
          "name": "NSO Group ( original pulse degraded by a delete service) ",
          "description": "",
          "modified": "2025-12-19T16:50:33.337000",
          "created": "2025-12-19T16:50:33.337000",
          "tags": [
            "iocs",
            "urls https",
            "generic malware",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "detection list",
            "luca stealer",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malicious url",
            "alexa top",
            "malicious site",
            "malware site",
            "unsafe",
            "trojanx",
            "malware",
            "metastealer",
            "alexa",
            "dbatloader",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "trojan",
            "irata",
            "allakore",
            "trojanspy",
            "hash",
            "ms windows",
            "pe32",
            "write c",
            "t1045",
            "show",
            "high",
            "search",
            "pe32 executable",
            "copy",
            "write",
            "win64",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "entries",
            "powershell",
            "mfc mfc",
            "united",
            "as54113",
            "as14061",
            "as9009 m247",
            "whitelisted",
            "status",
            "united kingdom",
            "name servers",
            "aaaa",
            "passive dns",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "files domain",
            "files related",
            "pulses otx",
            "pulses",
            "as15133 verizon",
            "cname",
            "as16552 tiggee",
            "as20940",
            "domain",
            "as16625 akamai",
            "creation date",
            "body",
            "unknown",
            "ipv4",
            "softcnapp",
            "trojandropper",
            "epaeedpaer",
            "eoaee",
            "qaexedoae",
            "showing",
            "sha256",
            "strings",
            "august",
            "files",
            "main",
            "germany asn",
            "win32",
            "miner",
            "next",
            "asnone united",
            "moved",
            "as8987 amazon",
            "trojanproxy",
            "virtool",
            "yara rule",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "present sep",
            "twitter",
            "accept",
            "certificate",
            "record value",
            "dynamicloader",
            "medium",
            "dynamic",
            "network",
            "reads",
            "port",
            "anomaly",
            "overview domain",
            "tags",
            "related tags",
            "dns status",
            "hostname query",
            "type address",
            "first seen",
            "seen asn",
            "country unknown",
            "nxdomain",
            "a nxdomain",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "encrypt",
            "hostname",
            "files ip",
            "address domain",
            "france",
            "emails",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "contacted",
            "wine emulator",
            "ip address",
            "script urls",
            "date",
            "meta",
            "flag united",
            "url http",
            "pulse http",
            "http",
            "as8075",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "servers",
            "expiration date",
            "sorry something",
            "gmt content",
            "canada unknown",
            "error",
            "backend",
            "france unknown",
            "alfper",
            "gmt contenttype",
            "apache",
            "exploit",
            "as15169 google",
            "wireless",
            "as23027 boingo",
            "pulse submit",
            "url analysis",
            "location united",
            "nso group",
            "pegasus spyware",
            "url indicator",
            "active created",
            "modified",
            "email",
            "nso",
            "germany",
            "pattern",
            "susp",
            "msil",
            "akamai",
            "gmt connection",
            "netherlands",
            "ovhfr",
            "ns nxdomain",
            "australia",
            "redacted for",
            "andariel group",
            "defense",
            "andariel",
            "check",
            "opera ua",
            "et trojan",
            "attempts",
            "april",
            "zbot",
            "possible zeus",
            "as140107 citis",
            "america asn",
            "as22612",
            "as397240",
            "as19527 google",
            "apple"
          ],
          "references": [
            "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "Andariel group \u00bb State-sponsored threat actor & Defense media",
            "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
            "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
            "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
            "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
            "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
            "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
            "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
            "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
            "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
            "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
            "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
            "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
          ],
          "public": 1,
          "adversary": "NSO",
          "targeted_countries": [
            "United States of America",
            "Sweden",
            "Germany",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "France",
            "Spain",
            "Canada",
            "Singapore",
            "Japan",
            "Korea, Republic of",
            "Ireland",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan:Win64/CoinMiner.WE",
              "display_name": "Trojan:Win64/CoinMiner.WE",
              "target": "/malware/Trojan:Win64/CoinMiner.WE"
            },
            {
              "id": "Trojan:Win32/SmokeLoader",
              "display_name": "Trojan:Win32/SmokeLoader",
              "target": "/malware/Trojan:Win32/SmokeLoader"
            },
            {
              "id": "PWS:Win32/Zbot!CI",
              "display_name": "PWS:Win32/Zbot!CI",
              "target": "/malware/PWS:Win32/Zbot!CI"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1138",
              "name": "Application Shimming",
              "display_name": "T1138 - Application Shimming"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66f55cdc8257c7fa223ed052",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2852,
            "FileHash-SHA1": 2194,
            "FileHash-SHA256": 6649,
            "domain": 1881,
            "hostname": 1706,
            "URL": 553,
            "CVE": 3,
            "email": 25
          },
          "indicator_count": 15863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "122 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6916e098df39114161354b23",
          "name": "Exodus l Cellbrite \u2022 Pegasus | Brian Sabey | HallRender | Tulach ",
          "description": "",
          "modified": "2025-12-14T07:05:42.106000",
          "created": "2025-11-14T07:56:08.872000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a76c2901b34c79a681596d",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4295,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3255,
            "domain": 2911,
            "hostname": 2894,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13986,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "127 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "681386d75c34469176686756",
          "name": "x.com/KulinskiArkadi",
          "description": "",
          "modified": "2025-05-31T14:01:10.044000",
          "created": "2025-05-01T14:36:07.422000",
          "tags": [
            "script",
            "etag",
            "sharing",
            "cors",
            "mediatype",
            "mediasubtype",
            "contenttype",
            "header",
            "combination",
            "compression",
            "encrypt",
            "cookie",
            "critical",
            "twitter",
            "iframe",
            "insert",
            "info",
            "error",
            "suspicious",
            "find",
            "screen",
            "grok",
            "body"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 471,
            "CIDR": 34,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 5,
            "FileHash-SHA256": 1177,
            "domain": 214,
            "hostname": 430,
            "email": 2
          },
          "indicator_count": 2342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "324 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f55cdc8257c7fa223ed052",
          "name": "NSO Group attacks Uptown Denver Neighborhood",
          "description": "Stems from 'hushed' cyber attack that lasted for several days in surrounding neighborhoods near (MSU) Metro State University. Pegasus spyware detected. The attack affected devices, bypassed credentials , passwords and compromised networks. Remedy: reset network multiple times. \n\nI'm not implying attack disseminates from MSU. \nSpectrum.com and Quantum Fiber Cyber Folks .PL related / MSU\nSoftware used \n\n\n\n \n*Cyber Folks .pl *https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
          "modified": "2024-10-26T12:05:43.885000",
          "created": "2024-09-26T13:08:44.341000",
          "tags": [
            "iocs",
            "urls https",
            "generic malware",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "detection list",
            "luca stealer",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malicious url",
            "alexa top",
            "malicious site",
            "malware site",
            "unsafe",
            "trojanx",
            "malware",
            "metastealer",
            "alexa",
            "dbatloader",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "trojan",
            "irata",
            "allakore",
            "trojanspy",
            "hash",
            "ms windows",
            "pe32",
            "write c",
            "t1045",
            "show",
            "high",
            "search",
            "pe32 executable",
            "copy",
            "write",
            "win64",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "entries",
            "powershell",
            "mfc mfc",
            "united",
            "as54113",
            "as14061",
            "as9009 m247",
            "whitelisted",
            "status",
            "united kingdom",
            "name servers",
            "aaaa",
            "passive dns",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "files domain",
            "files related",
            "pulses otx",
            "pulses",
            "as15133 verizon",
            "cname",
            "as16552 tiggee",
            "as20940",
            "domain",
            "as16625 akamai",
            "creation date",
            "body",
            "unknown",
            "ipv4",
            "softcnapp",
            "trojandropper",
            "epaeedpaer",
            "eoaee",
            "qaexedoae",
            "showing",
            "sha256",
            "strings",
            "august",
            "files",
            "main",
            "germany asn",
            "win32",
            "miner",
            "next",
            "asnone united",
            "moved",
            "as8987 amazon",
            "trojanproxy",
            "virtool",
            "yara rule",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "present sep",
            "twitter",
            "accept",
            "certificate",
            "record value",
            "dynamicloader",
            "medium",
            "dynamic",
            "network",
            "reads",
            "port",
            "anomaly",
            "overview domain",
            "tags",
            "related tags",
            "dns status",
            "hostname query",
            "type address",
            "first seen",
            "seen asn",
            "country unknown",
            "nxdomain",
            "a nxdomain",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "encrypt",
            "hostname",
            "files ip",
            "address domain",
            "france",
            "emails",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "contacted",
            "wine emulator",
            "ip address",
            "script urls",
            "date",
            "meta",
            "flag united",
            "url http",
            "pulse http",
            "http",
            "as8075",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "servers",
            "expiration date",
            "sorry something",
            "gmt content",
            "canada unknown",
            "error",
            "backend",
            "france unknown",
            "alfper",
            "gmt contenttype",
            "apache",
            "exploit",
            "as15169 google",
            "wireless",
            "as23027 boingo",
            "pulse submit",
            "url analysis",
            "location united",
            "nso group",
            "pegasus spyware",
            "url indicator",
            "active created",
            "modified",
            "email",
            "nso",
            "germany",
            "pattern",
            "susp",
            "msil",
            "akamai",
            "gmt connection",
            "netherlands",
            "ovhfr",
            "ns nxdomain",
            "australia",
            "redacted for",
            "andariel group",
            "defense",
            "andariel",
            "check",
            "opera ua",
            "et trojan",
            "attempts",
            "april",
            "zbot",
            "possible zeus",
            "as140107 citis",
            "america asn",
            "as22612",
            "as397240",
            "as19527 google",
            "apple"
          ],
          "references": [
            "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "Andariel group \u00bb State-sponsored threat actor & Defense media",
            "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
            "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
            "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
            "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
            "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
            "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
            "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
            "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
            "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
            "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
            "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
            "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
          ],
          "public": 1,
          "adversary": "NSO",
          "targeted_countries": [
            "United States of America",
            "Sweden",
            "Germany",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "France",
            "Spain",
            "Canada",
            "Singapore",
            "Japan",
            "Korea, Republic of",
            "Ireland",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan:Win64/CoinMiner.WE",
              "display_name": "Trojan:Win64/CoinMiner.WE",
              "target": "/malware/Trojan:Win64/CoinMiner.WE"
            },
            {
              "id": "Trojan:Win32/SmokeLoader",
              "display_name": "Trojan:Win32/SmokeLoader",
              "target": "/malware/Trojan:Win32/SmokeLoader"
            },
            {
              "id": "PWS:Win32/Zbot!CI",
              "display_name": "PWS:Win32/Zbot!CI",
              "target": "/malware/PWS:Win32/Zbot!CI"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1138",
              "name": "Application Shimming",
              "display_name": "T1138 - Application Shimming"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2852,
            "FileHash-SHA1": 2194,
            "FileHash-SHA256": 6649,
            "domain": 1881,
            "hostname": 1706,
            "URL": 553,
            "CVE": 3,
            "email": 25
          },
          "indicator_count": 15863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "541 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aab954f5f03a1f2906b39c",
          "name": "Zerobot",
          "description": "",
          "modified": "2024-10-12T07:01:26.973000",
          "created": "2024-01-19T18:03:00.966000",
          "tags": [
            "ssl certificate",
            "whois record",
            "referrer",
            "historical ssl",
            "resolutions",
            "whois whois",
            "communicating",
            "subdomains",
            "contacted",
            "c1on",
            "cmdwget http",
            "metro",
            "zerobot",
            "execution",
            "skynet",
            "june"
          ],
          "references": [
            "https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities Source"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZeroBot",
              "display_name": "ZeroBot",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65aa168aeddea4851fc47cc3",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 123,
            "FileHash-SHA1": 123,
            "FileHash-SHA256": 2498,
            "domain": 1600,
            "hostname": 2749,
            "URL": 6303,
            "CVE": 1
          },
          "indicator_count": 13397,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "555 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c235b05007103d3e3e7038",
          "name": "HCA -  Win32:RansomX-gen affecting HCA (HealthOneCares) + Miscellaneous Attacks",
          "description": "HCA (Health One Cares) affected by a RansomX and various serious attacks. It's linked back to a neurosurgeon who is likely not responsible for attack of course. It has been the same,e group of attackers using Samuel Tulach engineered malware. I'm unsure if there is collusion between Brian Sabey (consistent attacker) and Samuel Tulach. I just know it relates back to the same threat actors that have been hacking healthcare facilities, government offices, telecommunications, technology at health centers abusing webcams and patients records modification, and distribution. PHI PII issues.",
          "modified": "2024-09-17T17:01:24.349000",
          "created": "2024-08-18T17:56:00.485000",
          "tags": [
            "blacklist http",
            "safe site",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "alexa top",
            "united",
            "million",
            "mail spammer",
            "malicious site",
            "phishing site",
            "team phishing",
            "tofsee",
            "malware",
            "bank",
            "unsafe",
            "azorult",
            "cobalt strike",
            "service",
            "runescape",
            "facebook",
            "download",
            "zbot",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cl0p",
            "inmortal",
            "domains",
            "referrer",
            "historical ssl",
            "apple stuff",
            "combined",
            "hr rtd",
            "network",
            "collection",
            "vt graph",
            "round",
            "metro",
            "execution",
            "emotet",
            "startpage",
            "maltiverse top",
            "paypal",
            "blacklist",
            "passive dns",
            "related nids",
            "urls",
            "flag united",
            "accept",
            "acceptencoding",
            "hit age",
            "ip asn",
            "malware site",
            "adware",
            "fakealert",
            "opencandy",
            "exploit",
            "raccoon",
            "metastealer",
            "redline stealer",
            "anonymizer",
            "heur",
            "outlook",
            "phishing airbnb",
            "engineering",
            "phishing",
            "filerepmalware",
            "maltiverse",
            "div div",
            "c span",
            "div section",
            "span div",
            "search",
            "showing",
            "unknown",
            "as397240",
            "moved",
            "date",
            "body",
            "as54113",
            "github pages",
            "a domains",
            "entries",
            "mtb jul",
            "class",
            "sea x",
            "scan endpoints",
            "all scoreblue",
            "alf features",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "date hash",
            "next",
            "worm",
            "dynamicloader",
            "yara rule",
            "high",
            "windows",
            "grum",
            "medium",
            "installs",
            "windows startup",
            "application",
            "stream",
            "as22612",
            "ipv4",
            "pulse pulses",
            "files",
            "switch dns",
            "query",
            "data",
            "noname057",
            "password",
            "cybercrime",
            "malicious url",
            "kuaizip",
            "team",
            "downloader",
            "generic",
            "crack",
            "presenoker",
            "dapato",
            "riskware",
            "genkryptik",
            "fuery",
            "agent",
            "wacatac",
            "union",
            "shellexecuteexw",
            "hash",
            "writeconsolew",
            "registry",
            "t1031",
            "trojan",
            "copy",
            "dock",
            "write",
            "win32",
            "file execution",
            "explorer",
            "alerts",
            "checks",
            "bios",
            "system restore",
            "anne",
            "training",
            "strings http",
            "basic telephone",
            "xsl stylesheets",
            "apache fop",
            "createdate",
            "modifydate",
            "producer apache",
            "format",
            "core",
            "nxscspu",
            "zsextbzusbrvsk",
            "pxnzj",
            "jwxkrhdlrivprs",
            "default",
            "qxrfnjuodik",
            "mncau",
            "csqvrkwsqka",
            "testpath path",
            "else",
            "null",
            "suspicious",
            "win64",
            "hotkey",
            "ransom",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "push"
          ],
          "references": [
            "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
            "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
            "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
            "https://work.a-poster.info",
            "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
            "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
            "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
            "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
            "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
            "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
            "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
            "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
            "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
            "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
            "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.YL",
              "display_name": "Trojan:Win32/Emotet.YL",
              "target": "/malware/Trojan:Win32/Emotet.YL"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "display_name": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [
            "Civilian Society",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 891,
            "FileHash-MD5": 2368,
            "FileHash-SHA1": 1873,
            "FileHash-SHA256": 5092,
            "domain": 648,
            "hostname": 557,
            "CVE": 8,
            "email": 2
          },
          "indicator_count": 11439,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "580 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b3fb6752ac464268b971b1",
          "name": "BazaarLoader | REDCAP | https://jbplegal com/ | Cyber espionage",
          "description": "Found periphery.m (moderate sized dump) Targets Tsara Brashears Several staffed law offices based on Colorado, USA.\nContact made. Physical records. Client: Brashears.\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Trojan.Win32.REDCAP.MCRK/\n1c597b7c7934ef03eb0def0b64655dd79abe08567ff3053761e5516064a43376\nhttps://otx.alienvault.com/malware/TEL:Trojan:Win32%2FBazaarLoader!MTB/\nhttps://www.trendmicro.com/en_ph/research/21/k/bazarloader-adds-compromised-installers-iso-to-arrival-delivery-vectors.html\nTEL:Trojan:Win32/BazaarLoader\n987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7",
          "modified": "2024-09-05T07:02:20.491000",
          "created": "2024-01-26T18:35:19.690000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as3356 level",
            "as15133 verizon",
            "as22822",
            "as20446",
            "cname",
            "honeypot",
            "read c",
            "regsetvalueexa",
            "regdword",
            "as29789",
            "moved",
            "morphex",
            "cryp",
            "susp"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2401,
            "FileHash-MD5": 2428,
            "FileHash-SHA1": 2136,
            "FileHash-SHA256": 5377,
            "domain": 3794,
            "hostname": 2763,
            "CVE": 5,
            "email": 19,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 18927,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "592 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85df45cc3d3fd07139ea9",
          "name": "Honeypot | https://jbplegal com/ | Cyber espionage | DynamicLoader",
          "description": "",
          "modified": "2024-09-05T06:38:09.443000",
          "created": "2024-01-30T02:24:52.774000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "name servers",
            "meta",
            "as43317 fishnet"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil",
            "Netherlands",
            "Romania",
            "Russian Federation",
            "Japan"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b47501fcbc39983f098723",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2390,
            "FileHash-MD5": 2213,
            "FileHash-SHA1": 1921,
            "FileHash-SHA256": 4357,
            "domain": 3534,
            "hostname": 2670,
            "CVE": 5,
            "email": 17,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 17111,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "592 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "669e42fea462f0c8f8db32a1",
          "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
          "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
          "modified": "2024-08-21T11:03:59.106000",
          "created": "2024-07-22T11:31:10.391000",
          "tags": [
            "historical ssl",
            "referrer",
            "fancy bear",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "open",
            "status",
            "name servers",
            "creation date",
            "search",
            "proofpoint",
            "expiration date",
            "div div",
            "date",
            "accept",
            "next",
            "united",
            "cname",
            "asnone united",
            "a nxdomain",
            "domain",
            "united kingdom",
            "servers",
            "showing",
            "nxdomain",
            "dname",
            "whitelisted",
            "aaaa",
            "script urls",
            "costa rica",
            "script domains",
            "msie",
            "chrome",
            "unknown",
            "body",
            "gmt content",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "as8987 amazon",
            "as20940",
            "hostname",
            "gartner",
            "crowdstrike",
            "business value",
            "magic quadrant",
            "customer",
            "realized",
            "assessment",
            "economic impact",
            "complete",
            "february",
            "utc na",
            "ver2",
            "msclkidn",
            "html info",
            "meta tags",
            "mobileoptimized",
            "adobe dynamic",
            "tag management",
            "utc bing",
            "cobalt strike",
            "communications",
            "android device",
            "neutral",
            "win32 exe",
            "pe32",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "sections",
            "rticon neutral",
            "ico rtgroupicon",
            "xml rtmanifest",
            "overlay",
            "threat roundup",
            "pandas",
            "attacks against",
            "southeast",
            "wannacry kill",
            "switch dns",
            "query",
            "high level",
            "hackers",
            "unknown win",
            "core",
            "ascii text",
            "sha256",
            "sha1",
            "size",
            "pattern match",
            "suricata stream",
            "command decode",
            "utf8 text",
            "mitre att",
            "path",
            "hybrid",
            "starfield",
            "meta",
            "general",
            "target",
            "local",
            "click",
            "strings",
            "trident",
            "legacy",
            "main",
            "contact",
            "flow t1574",
            "dll sideloading",
            "create",
            "modify system",
            "process t1543",
            "windows service",
            "t1055 system",
            "pe file",
            "t1497 query",
            "may sleep",
            "allocate rwx",
            "get file",
            "access",
            "windows event",
            "allocate",
            "link function",
            "windows link",
            "contains pdb",
            "dns resolutions",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls tcp",
            "hashes",
            "user",
            "file system",
            "written c",
            "samplepath",
            "files dropped",
            "userprofile",
            "registry keys",
            "registry",
            "set registrya",
            "conhost",
            "comspec",
            "created",
            "temp",
            "windows",
            "displayname",
            "process",
            "commands",
            "signals mutexes",
            "mutexes",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "inc validity",
            "subject public",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net148",
            "net1480000",
            "as16509",
            "as22843",
            "as13916",
            "form",
            "server",
            "registrar abuse",
            "email",
            "request email",
            "verisign",
            "icann whois",
            "tech",
            "first",
            "project skynet",
            "cyber army",
            "dynamicloader",
            "high",
            "delete c",
            "show",
            "username",
            "medium",
            "default",
            "yara detections",
            "worm",
            "copy",
            "write",
            "duptwux",
            "malware",
            "x82xd4",
            "kx81xdbx0f",
            "x86xd3",
            "xa1xf1",
            "xe8xc2x14",
            "wx99xcdx11",
            "regsetvalueexa",
            "regbinary",
            "xe8xc6x13",
            "hx88x9ax1e",
            "stream",
            "win32",
            "persistence",
            "execution",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "ftp username",
            "contacted",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "null",
            "refresh",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "robtex",
            "apple ios",
            "apple",
            "domains",
            "co number",
            "virtual mobile",
            "logistics",
            "cyber defense",
            "twitter",
            "read c",
            "artemis",
            "intel",
            "steals",
            "virustotal",
            "python",
            "panda",
            "falcon sandbox",
            "analysis",
            "hybrid analysis",
            "submission name",
            "av detection",
            "multi scan",
            "highest",
            "ability",
            "execute",
            "upgrade",
            "intelligence",
            "learn",
            "reports",
            "logo analysis",
            "size17kib type",
            "command",
            "found",
            "layer protocol",
            "osi application",
            "ip address",
            "t1105 ingress",
            "tool transfer",
            "problems",
            "threat network",
            "infrastructure",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "startpage",
            "e1203 windows",
            "catalog tree",
            "analysis ob0001",
            "b0001 process",
            "b0003 delayed",
            "analysis ob0002",
            "evasion ob0006",
            "ob0007 system",
            "e1082 file",
            "e1083 impact",
            "data manipulation",
            "remote system",
            "discovery",
            "t1059 accept",
            "modules t1129",
            "enumerate",
            "as2914 ntt",
            "access denied",
            "as16625 akamai",
            "germany unknown",
            "csccorpdomains",
            "as31109",
            "invalid url",
            "mirai",
            "port",
            "destination",
            "bad login",
            "suspicious path",
            "nids",
            "tcp syn",
            "root account",
            "cve20185723",
            "as8068",
            "please",
            "x msedge",
            "embeddedwb",
            "windows nt",
            "tofsee",
            "push",
            "as54113",
            "as396982 google",
            "as31898 oracle",
            "moved",
            "encrypt"
          ],
          "references": [
            "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
            "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
            "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
            "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
            "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
            "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
            "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
            "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
            "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
            "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
            "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
            "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
            "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
            "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
            "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
            "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
            "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
            "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
            "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
            "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
            "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
            "http://images.contact.acams.org/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Trojan.Agent.FRYX",
              "display_name": "Trojan.Agent.FRYX",
              "target": null
            },
            {
              "id": "Win32:AceCrypter-B [Cryp]",
              "display_name": "Win32:AceCrypter-B [Cryp]",
              "target": null
            },
            {
              "id": "Mal_Tofsee",
              "display_name": "Mal_Tofsee",
              "target": null
            },
            {
              "id": "Ransom.StopcryptPMF.",
              "display_name": "Ransom.StopcryptPMF.",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Worm:Win32/Ganelp.A",
              "display_name": "Worm:Win32/Ganelp.A",
              "target": "/malware/Worm:Win32/Ganelp.A"
            },
            {
              "id": "trojan.shellrunner/emailworm",
              "display_name": "trojan.shellrunner/emailworm",
              "target": null
            },
            {
              "id": "trojan.redcap/python",
              "display_name": "trojan.redcap/python",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1565",
              "name": "Data Manipulation",
              "display_name": "T1565 - Data Manipulation"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 890,
            "FileHash-SHA1": 853,
            "FileHash-SHA256": 7215,
            "domain": 2771,
            "hostname": 5544,
            "URL": 13393,
            "email": 12,
            "SSLCertFingerprint": 15,
            "CIDR": 1,
            "CVE": 3
          },
          "indicator_count": 30697,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 237,
          "modified_text": "607 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aa168aeddea4851fc47cc3",
          "name": "Zerobot & Skynet",
          "description": "Zerobot is a new botnet written in the Go programming language. It communicates via the WebSocket protocol",
          "modified": "2024-03-23T01:01:38.014000",
          "created": "2024-01-19T06:28:26.343000",
          "tags": [
            "ssl certificate",
            "whois record",
            "referrer",
            "historical ssl",
            "resolutions",
            "whois whois",
            "communicating",
            "subdomains",
            "contacted",
            "c1on",
            "cmdwget http",
            "metro",
            "zerobot",
            "execution",
            "skynet",
            "june"
          ],
          "references": [
            "https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities Source"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZeroBot",
              "display_name": "ZeroBot",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 78,
            "FileHash-SHA1": 78,
            "FileHash-SHA256": 2290,
            "domain": 1491,
            "hostname": 2611,
            "URL": 5879,
            "CVE": 8
          },
          "indicator_count": 12435,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "758 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8c8b8997508722c642ee",
          "name": "Phishing Campaign | Pegasus ",
          "description": "",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-02-03T18:57:15.475000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b8a05a0b9ebf8d916f0a6d",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8a052c4160dbd76054f8a",
          "name": "Callback Phishing Campaign | Pegasus |  Callback Phishing | https://safebae.org/",
          "description": "Multiple ransomware groups have adopted the  BazarCall callback phishing technique a sophisticated scam; to gain initial access to victims' networks\nCallback phishing is a  relying on a multi-stage process, exploiting trust to manipulate victims into divulging sensitive information or. At its core, callback phishing is a sophisticated social engineering tactic that triggers an emotional reaction from a victim and compels them to engage.\n\nStrange alleged tribute website appears to target Tsara Brashears. The alleged SA victims name is Catherine 'Daisy' Coleman name isn't part infrastructure. Malicious",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-01-30T07:08:02.918000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8a056f2c1f16d391175b0",
          "name": "Callback Phishing Campaign | Pegasus |  Callback Phishing | https://safebae.org/",
          "description": "Multiple ransomware groups have adopted the  BazarCall callback phishing technique a sophisticated scam; to gain initial access to victims' networks\nCallback phishing is a  relying on a multi-stage process, exploiting trust to manipulate victims into divulging sensitive information or. At its core, callback phishing is a sophisticated social engineering tactic that triggers an emotional reaction from a victim and compels them to engage.\n\nStrange alleged tribute website appears to target Tsara Brashears. The alleged SA victims name is Catherine 'Daisy' Coleman name isn't part infrastructure. Malicious",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-01-30T07:08:06.711000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8a05a0b9ebf8d916f0a6d",
          "name": "Callback Phishing Campaign | Pegasus |  Callback Phishing | https://safebae.org/",
          "description": "Multiple ransomware groups have adopted the  BazarCall callback phishing technique a sophisticated scam; to gain initial access to victims' networks\nCallback phishing is a  relying on a multi-stage process, exploiting trust to manipulate victims into divulging sensitive information or. At its core, callback phishing is a sophisticated social engineering tactic that triggers an emotional reaction from a victim and compels them to engage.\n\nStrange alleged tribute website appears to target Tsara Brashears. The alleged SA victims name is Catherine 'Daisy' Coleman name isn't part infrastructure. Malicious",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-01-30T07:08:10.072000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b9716ef65566497546a7b1",
          "name": "Callback Phishing Campaign | Pegasus | https://safebae.org/",
          "description": "",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-01-30T22:00:14.725000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b8a05a0b9ebf8d916f0a6d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c970b55f5040aee8c91a55",
          "name": "Callback Phishing Campaign | Pegasus",
          "description": "",
          "modified": "2024-02-29T04:00:48.424000",
          "created": "2024-02-12T01:13:25.034000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b8a05a0b9ebf8d916f0a6d",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3266,
            "domain": 1458,
            "hostname": 1265,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b80982381b53c66f0dd1e1",
          "name": "BazaarLoader | REDCAP | https://jbplegal com/ | Cyber espionage",
          "description": "",
          "modified": "2024-02-25T17:03:29.232000",
          "created": "2024-01-29T20:24:34.644000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as3356 level",
            "as15133 verizon",
            "as22822",
            "as20446",
            "cname",
            "honeypot",
            "read c",
            "regsetvalueexa",
            "regdword",
            "as29789",
            "moved",
            "morphex",
            "cryp",
            "susp"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b47524b1ec6b5c783a832e",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1530,
            "FileHash-MD5": 2428,
            "FileHash-SHA1": 2136,
            "FileHash-SHA256": 5239,
            "domain": 3740,
            "hostname": 2560,
            "CVE": 5,
            "email": 19,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 17661,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "785 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b47524b1ec6b5c783a832e",
          "name": "BazaarLoader | REDCAP | https://jbplegal com/ | Cyber espionage",
          "description": "",
          "modified": "2024-02-25T17:03:29.232000",
          "created": "2024-01-27T03:14:44.070000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as3356 level",
            "as15133 verizon",
            "as22822",
            "as20446",
            "cname",
            "honeypot",
            "read c",
            "regsetvalueexa",
            "regdword",
            "as29789",
            "moved",
            "morphex",
            "cryp",
            "susp"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b3fb6752ac464268b971b1",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1530,
            "FileHash-MD5": 2428,
            "FileHash-SHA1": 2136,
            "FileHash-SHA256": 5239,
            "domain": 3740,
            "hostname": 2560,
            "CVE": 5,
            "email": 19,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 17661,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "785 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b47501fcbc39983f098723",
          "name": "Honeypot | https://jbplegal com/ | Cyber espionage | DynamicLoader",
          "description": "",
          "modified": "2024-02-25T17:03:29.232000",
          "created": "2024-01-27T03:14:09.392000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "name servers",
            "meta",
            "as43317 fishnet"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil",
            "Netherlands",
            "Romania",
            "Russian Federation",
            "Japan"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b3fe6c4cd0f5158eb18692",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1509,
            "FileHash-MD5": 2213,
            "FileHash-SHA1": 1921,
            "FileHash-SHA256": 4239,
            "domain": 3480,
            "hostname": 2466,
            "CVE": 5,
            "email": 17,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 15854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "785 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b3fe6c4cd0f5158eb18692",
          "name": "Honeypot | https://jbplegal com/ | Cyber espionage | DynamicLoader,",
          "description": "Found periphery.m (moderate sized dump) Targets Tsara Brashears Several staffed law offices based on Colorado, USA. Contact made. Physical records. Client: Brashears. https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Trojan.Win32.REDCAP.MCRK/ 1c597b7c7934ef03eb0def0b64655dd79abe08567ff3053761e5516064a43376 https://otx.alienvault.com/malware/TEL:Trojan:Win32%2FBazaarLoader!MTB/ https://www.trendmicro.com/en_ph/research/21/k/bazarloader-adds-compromised-installers-iso-to-arrival-delivery-vectors.html TEL:Trojan:Win32/BazaarLoader 987204ca82337f0a3f28097a5d66d5f3ecb11d43d82f67cd753d0bf2ce40b7a7https://www.joesandbox.com/analysis/1311477\nTarget: Critical Risk. In person contact made. Fraud services offered. \nThis is crazy.",
          "modified": "2024-02-25T17:03:29.232000",
          "created": "2024-01-26T18:48:12.433000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "name servers",
            "meta",
            "as43317 fishnet"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil",
            "Netherlands",
            "Romania",
            "Russian Federation",
            "Japan"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1509,
            "FileHash-MD5": 2213,
            "FileHash-SHA1": 1921,
            "FileHash-SHA256": 4239,
            "domain": 3480,
            "hostname": 2466,
            "CVE": 5,
            "email": 17,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 15854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "785 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8dde8544d0b022b4c464",
          "name": "Honeypot | https://jbplegal com/ | Cyber espionage  | Emotet ",
          "description": "",
          "modified": "2024-02-25T17:03:29.232000",
          "created": "2024-02-03T19:02:54.507000",
          "tags": [
            "no expiration",
            "filehashsha1",
            "filehashmd5",
            "filehashsha256",
            "url http",
            "ipv4",
            "iocs",
            "url https",
            "next",
            "scan endpoints",
            "expiration",
            "domain",
            "pdf report",
            "pcap",
            "all scoreblue",
            "hostname",
            "tagwearable",
            "email",
            "united",
            "as46562",
            "unknown",
            "as213120",
            "search",
            "creation date",
            "dnssec",
            "showing",
            "entries",
            "as32400 hostway",
            "encrypt",
            "status",
            "date",
            "passive dns",
            "urls",
            "record value",
            "apache",
            "pragma",
            "body",
            "as9009 m247",
            "pulse pulses",
            "files",
            "hosting",
            "location new",
            "as58955 bangmod",
            "pulse submit",
            "url analysis",
            "reverse dns",
            "all search",
            "otx scoreblue",
            "http",
            "ip address",
            "related nids",
            "filehash",
            "sha256",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "aaaa",
            "a domains",
            "address",
            "div div",
            "span span",
            "span h2",
            "a li",
            "lucky guy",
            "span",
            "customer",
            "location united",
            "cookie",
            "as54113",
            "xamzexpires300",
            "hstr",
            "github pages",
            "request id",
            "accept",
            "win64",
            "found",
            "show",
            "win32",
            "related pulses",
            "sea x",
            "cache",
            "dynamicloader",
            "targetname",
            "pe32",
            "intel",
            "ms windows",
            "yara rule",
            "high",
            "write",
            "bruteforce",
            "location china",
            "asn as45090",
            "cobalt strike",
            "internet",
            "iana",
            "whois lookups",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "net192",
            "net1920000",
            "ssl cert",
            "ssl certificate",
            "tlsv1 apr",
            "cobaltstrike",
            "default",
            "read",
            "trojan",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "malware",
            "no entries",
            "entries found",
            "delete",
            "found pe",
            "stus",
            "cnus",
            "tlsv1",
            "as20940",
            "as16625 akamai",
            "asnone united",
            "emails",
            "microsoft way",
            "as8075",
            "united kingdom",
            "aaaa nxdomain",
            "a nxdomain",
            "nxdomain",
            "as8068",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "name servers",
            "meta",
            "as43317 fishnet"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil",
            "Netherlands",
            "Romania",
            "Russian Federation",
            "Japan"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b85df45cc3d3fd07139ea9",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1509,
            "FileHash-MD5": 2213,
            "FileHash-SHA1": 1921,
            "FileHash-SHA256": 4239,
            "domain": 3480,
            "hostname": 2466,
            "CVE": 5,
            "email": 17,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 15854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "785 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b80a20bbcd0eb305a740ec",
          "name": "Exodus l Cellbrite | Brian Sabey | HallRender | Tulach",
          "description": "",
          "modified": "2024-02-16T05:03:15.321000",
          "created": "2024-01-29T20:27:12.899000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a76c2901b34c79a681596d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4101,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3155,
            "domain": 2894,
            "hostname": 2847,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13628,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "794 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a76c2901b34c79a681596d",
          "name": "Exodus l Cellbrite | Brian Sabey | HallRender | Tulach",
          "description": "Brian Sabey of Hall Render Law firm is incredibly entrenched in spying on a single target. Having made contact,impersonal invitations to meet, filing a lawsuit dismissed by a judge , paying to silence SA victim and spending many years spying, destroying digital profile m libel, malvertizing is concerning. \nConsidering Brashears death threats, following ,  being approached and attempts on her personal safety is unwarranted. Brashears was the confirmed victim of life threatening SA. How does the Federal Government allow this? Found embedded in Brashears link that came from her iPhone.",
          "modified": "2024-02-16T05:03:15.321000",
          "created": "2024-01-17T05:56:57.948000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4101,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3155,
            "domain": 2894,
            "hostname": 2847,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13628,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "794 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a77c6a22a236495c4548d6",
          "name": "PEGASUS | Exodus l Cellbrite | Brian Sabey | HallRender | Tulach",
          "description": "I'm unclear if the legitimatecy of use of Cellbrite considering Brashears was the attacked. Brashears has spoken with every authority on her own terms. Law enforcement 'you're not that important. You're not a suspect .' FBI -' Brashears victim of Identity theft case that lasted months. Alleged false reports removed.'  PI's - 'someone is abusing privilege' Was a SA advocate Non Profit. Awareness Saves & social media deleted by hackers",
          "modified": "2024-02-16T05:03:15.321000",
          "created": "2024-01-17T07:06:18.453000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "remote",
            "malvertizing",
            "spying",
            "cyber stalking"
          ],
          "references": [
            "https://tulach.cc/",
            "go.sabey.com",
            "sabey.com",
            "cellebrite.com",
            "https://cellebrite.com/en/federal-government/  [Pegasus ck privilege collection]",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "remote.aciscomputers.com",
            "https://track.toccha.com/978eb025-0a62-46fa-827c-d71aa0524818?zoneid=5939372&ua=high&subzone_id=3038557&set=social&country=SY&region=49&isp=syriatelmobiletelecom&useragent=Mozilla/5.0",
            "114.114.114.114 [Tulach]",
            "nr-data.net [Apple Private Data Collection]",
            "defenselawyernj.com",
            "attorney-marketing-specialists.com ?",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/image-recognition-and-searcher/id1450230225",
            "http://www.apple.com/appleca/AppleIncRootCertificate.cer",
            "http://flexlucky.com/isurvey/en/?devicemodel=iPhone&carrier=\u00aeion=Tbilisi&brand=Apple&browser=GoogleApp&prize=cur&u=track.bawiwia.com&isp=JSCGlobalErty&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=GE&click_id=wuo4jm6db011lufu2f8h138c&partner=5658402&skip=yes&frame={frame}&cost=0.010100&lang=en",
            "https://t.me/hermitspyware/24",
            "hyundai-smg.com | http://hyundai-smg.com/index.php?route=information/contact | http://hyundai-smg.com/index.php?route=information/contact",
            "https://imazing.com/guides/detect-pegasus-and-other-spyware-on-iphone",
            "http://watchhers.net/index.php [remote attackers | malware spreader]",
            "api-stage.pornhub.com",
            "newbrazzers.com [y8.com]",
            "www.videolan.org [info solutions]",
            "www2.blackbagtech.com [hidden users included]",
            "http://subtitles.rest7.com/subs/The.Expanse.S03E11.720p.HDTV.x264-KILLERS[eztv].mkv",
            "http://pegasus.diskel.co.uk/ [phishing]",
            "wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "fds.cellebrite.com",
            "http://www1.mychartahn.org/?tm=1&subid4=1671014887.0191400000&kw=Patient+Portal&KW1=Patient+Access+Network&KW2=Patient+Self+Check+In+System&KW3=Electronic+Health+Record+EHR+System&KW4=Patient+Appointment+Scheduling+System&KW5=Medical+Billing+System+Software&KW6=Patient+Financial+Assistance&searchbox=0&domainname=0&backfill=0",
            "healthcare.greatcall.com [fake call centers | PHI & PII info stealers]",
            "http://download.virtualbox.org/virtualbox/debian",
            "match.pegasus.isi.edu",
            "asp.net",
            "http://dropbox.com/ [ intrusions/ dropbox stealer]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1588.004",
              "name": "Digital Certificates",
              "display_name": "T1588.004 - Digital Certificates"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            }
          ],
          "industries": [
            "Individual",
            "Patient",
            "Healthcare",
            "Survivor"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4101,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3157,
            "domain": 2903,
            "hostname": 2847,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "794 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "659261e2290ac1ecc5d9ca74",
          "name": "Pegasus - a-poster.info",
          "description": "",
          "modified": "2024-01-31T04:00:35.757000",
          "created": "2024-01-01T06:55:30.771000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "ipv4",
            "expiration",
            "iocs",
            "ipv6",
            "url http",
            "url https",
            "next",
            "filehashmd5",
            "filehashsha1",
            "filehashsha256",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "cidr",
            "pcap",
            "stix",
            "subid",
            "mtsub26293293",
            "dashboard",
            "browse scan",
            "endpoints all",
            "octoseek",
            "a poster",
            "apple",
            "apple id",
            "apple engineering",
            "icloud",
            "tulach",
            "hallrender",
            "ck matrix",
            "ck id",
            "xobo",
            "a nxdomain",
            "sabey",
            "aaaa",
            "win32",
            "briansabey",
            "brian",
            "brian sabey",
            "urls https",
            "unknown urls",
            "united",
            "ttl value",
            "tsara brashears",
            "trojan",
            "tracker",
            "tofsee",
            "threat analyzer",
            "threat",
            "temp",
            "teams api",
            "subdomains",
            "active",
            "active threat",
            "strings",
            "status codes",
            "japan national police agency",
            "pegasus",
            "china",
            "aig",
            "ssl certificate",
            "accept",
            "ssh on server",
            "speakez securus",
            "show technique",
            "https",
            "relay",
            "state",
            "android",
            "address",
            "aposter",
            "workaposter",
            "sha256",
            "showing",
            "simple",
            "span",
            "small",
            "serving ip",
            "script",
            "search",
            "root",
            "ca",
            "samples",
            "root ca",
            "resolutions",
            "remote",
            "relay",
            "relacion",
            "referrer",
            "record value",
            "applenoc",
            "as16625",
            "attack",
            "apple attack",
            "bundled",
            "canvas",
            "mitre attk",
            "brute force passwords",
            "body length",
            "body",
            "backdoor",
            "bellsouth",
            "bahamut",
            "bell south",
            "mitre",
            "cellbrite",
            "class",
            "click",
            "authority",
            "contentencoding",
            "akamai",
            "as20940",
            "as24940 hetzner",
            "as58061 scalaxy",
            "scalaxy",
            "as714",
            "critical",
            "communicating",
            "quasar",
            "trojan",
            "et",
            "icefog",
            "pegasus",
            "tofsee",
            "cmd",
            "crypto",
            "error",
            "dns replication",
            "domain entries",
            "et cins",
            "execution",
            "cname",
            "config",
            "contact",
            "contacted",
            "copy",
            "creation date",
            "formbook",
            "jekyll",
            "graph",
            "germany unknown",
            "generator",
            "general",
            "forbidden",
            "falcon sandbox",
            "ssl hostname",
            "false",
            "file",
            "final url",
            "final url summary",
            "hashes files",
            "headers nel",
            "historical",
            "malicious host",
            "malvertizing",
            "malware",
            "tagging",
            "contextualizing",
            "localappdata",
            "install",
            "installer",
            "ioc search",
            "iocs kb",
            "body",
            "local",
            "United states",
            "name",
            "name servers",
            "mitre att",
            "metro",
            "meta",
            "mail spammer",
            "submit",
            "submit quasar",
            "phishing",
            "pattern match",
            "paste",
            "passive dns",
            "nxdomain",
            "national police agency japan",
            "network",
            "verdict",
            "cmd",
            "sandbox",
            "http response",
            "record type",
            "phishing",
            "nuance",
            "next",
            "new ioc",
            "subdomains",
            "germany",
            "reinsurance",
            "nuance",
            "cybercrime",
            "tracking",
            "cyber stalking",
            "fear",
            "masquerading",
            "cobalt strike"
          ],
          "references": [
            "a-poster.info",
            "https://tulach.cc/",
            "images.ctfassets.net",
            "https://www.pornhub.com/video/search?search=tsara+brashears [Apple Password Cracker]",
            "nr-data.net [Apple Private Data Collection]",
            "http://gmpg.org/xfn/11 [HTTrack]",
            "192.229.211.108 [Tracking & Virus Network]",
            "me.com [Pegasus]",
            "contact_pki@apple.com [CAA mail contact] [17.253.142.4 Apple CAA IP]",
            "37.1.217.172 [scanning host]",
            "https://www.virustotal.com/gui/domain/paypal-secure-id-login-webobjects-support-home.e-pornosex.com/community"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "IceFog",
              "display_name": "IceFog",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus for Android - MOB-S0032",
              "display_name": "Pegasus for Android - MOB-S0032",
              "target": null
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Trojan",
              "display_name": "Trojan",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Appleservice",
              "display_name": "Appleservice",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4695,
            "domain": 2494,
            "hostname": 3547,
            "FileHash-MD5": 4118,
            "FileHash-SHA1": 3496,
            "FileHash-SHA256": 5841,
            "CIDR": 12,
            "email": 17
          },
          "indicator_count": 24220,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "810 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "659261d5965b4824d1606cf9",
          "name": "Pegasus - a-poster.info",
          "description": "",
          "modified": "2024-01-31T04:00:35.757000",
          "created": "2024-01-01T06:55:17.262000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "ipv4",
            "expiration",
            "iocs",
            "ipv6",
            "url http",
            "url https",
            "next",
            "filehashmd5",
            "filehashsha1",
            "filehashsha256",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "cidr",
            "pcap",
            "stix",
            "subid",
            "mtsub26293293",
            "dashboard",
            "browse scan",
            "endpoints all",
            "octoseek",
            "a poster",
            "apple",
            "apple id",
            "apple engineering",
            "icloud",
            "tulach",
            "hallrender",
            "ck matrix",
            "ck id",
            "xobo",
            "a nxdomain",
            "sabey",
            "aaaa",
            "win32",
            "briansabey",
            "brian",
            "brian sabey",
            "urls https",
            "unknown urls",
            "united",
            "ttl value",
            "tsara brashears",
            "trojan",
            "tracker",
            "tofsee",
            "threat analyzer",
            "threat",
            "temp",
            "teams api",
            "subdomains",
            "active",
            "active threat",
            "strings",
            "status codes",
            "japan national police agency",
            "pegasus",
            "china",
            "aig",
            "ssl certificate",
            "accept",
            "ssh on server",
            "speakez securus",
            "show technique",
            "https",
            "relay",
            "state",
            "android",
            "address",
            "aposter",
            "workaposter",
            "sha256",
            "showing",
            "simple",
            "span",
            "small",
            "serving ip",
            "script",
            "search",
            "root",
            "ca",
            "samples",
            "root ca",
            "resolutions",
            "remote",
            "relay",
            "relacion",
            "referrer",
            "record value",
            "applenoc",
            "as16625",
            "attack",
            "apple attack",
            "bundled",
            "canvas",
            "mitre attk",
            "brute force passwords",
            "body length",
            "body",
            "backdoor",
            "bellsouth",
            "bahamut",
            "bell south",
            "mitre",
            "cellbrite",
            "class",
            "click",
            "authority",
            "contentencoding",
            "akamai",
            "as20940",
            "as24940 hetzner",
            "as58061 scalaxy",
            "scalaxy",
            "as714",
            "critical",
            "communicating",
            "quasar",
            "trojan",
            "et",
            "icefog",
            "pegasus",
            "tofsee",
            "cmd",
            "crypto",
            "error",
            "dns replication",
            "domain entries",
            "et cins",
            "execution",
            "cname",
            "config",
            "contact",
            "contacted",
            "copy",
            "creation date",
            "formbook",
            "jekyll",
            "graph",
            "germany unknown",
            "generator",
            "general",
            "forbidden",
            "falcon sandbox",
            "ssl hostname",
            "false",
            "file",
            "final url",
            "final url summary",
            "hashes files",
            "headers nel",
            "historical",
            "malicious host",
            "malvertizing",
            "malware",
            "tagging",
            "contextualizing",
            "localappdata",
            "install",
            "installer",
            "ioc search",
            "iocs kb",
            "body",
            "local",
            "United states",
            "name",
            "name servers",
            "mitre att",
            "metro",
            "meta",
            "mail spammer",
            "submit",
            "submit quasar",
            "phishing",
            "pattern match",
            "paste",
            "passive dns",
            "nxdomain",
            "national police agency japan",
            "network",
            "verdict",
            "cmd",
            "sandbox",
            "http response",
            "record type",
            "phishing",
            "nuance",
            "next",
            "new ioc",
            "subdomains",
            "germany",
            "reinsurance",
            "nuance",
            "cybercrime",
            "tracking",
            "cyber stalking",
            "fear",
            "masquerading",
            "cobalt strike"
          ],
          "references": [
            "a-poster.info",
            "https://tulach.cc/",
            "images.ctfassets.net",
            "https://www.pornhub.com/video/search?search=tsara+brashears [Apple Password Cracker]",
            "nr-data.net [Apple Private Data Collection]",
            "http://gmpg.org/xfn/11 [HTTrack]",
            "192.229.211.108 [Tracking & Virus Network]",
            "me.com [Pegasus]",
            "contact_pki@apple.com [CAA mail contact] [17.253.142.4 Apple CAA IP]",
            "37.1.217.172 [scanning host]",
            "https://www.virustotal.com/gui/domain/paypal-secure-id-login-webobjects-support-home.e-pornosex.com/community"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "IceFog",
              "display_name": "IceFog",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus for Android - MOB-S0032",
              "display_name": "Pegasus for Android - MOB-S0032",
              "target": null
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Trojan",
              "display_name": "Trojan",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Appleservice",
              "display_name": "Appleservice",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4719,
            "domain": 2497,
            "hostname": 3549,
            "FileHash-MD5": 4118,
            "FileHash-SHA1": 3496,
            "FileHash-SHA256": 5861,
            "CIDR": 12,
            "email": 17
          },
          "indicator_count": 24269,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "810 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f9011e57040b2717c99c",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:45.262000",
          "created": "2023-12-31T05:15:45.262000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6590f8f3b192d56e80294c13",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "841 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f8f3b192d56e80294c13",
          "name": "Aig.com Pegasus attack+ https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:31.645000",
          "created": "2023-12-31T05:15:31.645000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653f21878bcd05f7d594ff86",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "841 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65610ac149b19048e822118b",
          "name": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=",
          "description": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=2929&errtype=updatedownloaderinfo&funcname=updatedownloader::main&ibic=30b1f00119b0edae535883513aec9512&msg=start&os=mac_10_16&rnd=1663869393157734&ver=upd_01-27&verifier=db079154c6b8d1935cf1cf6cda123e25",
          "modified": "2023-12-24T19:00:45.425000",
          "created": "2023-11-24T20:42:41.302000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none file",
            "type textplain",
            "cyber threat",
            "united",
            "team",
            "covid19",
            "phishtank",
            "engineering",
            "phishing site",
            "malware site",
            "malware",
            "phishing",
            "malicious",
            "bank",
            "zeus",
            "zbot",
            "tinba",
            "stealer",
            "miner",
            "ponmocup",
            "ave maria",
            "artemis",
            "nymaim",
            "emotet",
            "redline stealer",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "ransomware",
            "matsnu",
            "kraken",
            "simda",
            "citadel",
            "vawtrak",
            "tag count",
            "mon oct",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "netsky",
            "team malware",
            "blacklist http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 222,
            "FileHash-SHA1": 122,
            "FileHash-SHA256": 2023,
            "URL": 6912,
            "domain": 1503,
            "hostname": 1755,
            "CVE": 1
          },
          "indicator_count": 12538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "848 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65610ac30744fcf636cc2a67",
          "name": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=",
          "description": "http://errors.dropopenobject.com/mac-error.gif?app=60094&campaign=2929&errtype=updatedownloaderinfo&funcname=updatedownloader::main&ibic=30b1f00119b0edae535883513aec9512&msg=start&os=mac_10_16&rnd=1663869393157734&ver=upd_01-27&verifier=db079154c6b8d1935cf1cf6cda123e25",
          "modified": "2023-12-24T19:00:45.425000",
          "created": "2023-11-24T20:42:43.965000",
          "tags": [
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "none file",
            "type textplain",
            "cyber threat",
            "united",
            "team",
            "covid19",
            "phishtank",
            "engineering",
            "phishing site",
            "malware site",
            "malware",
            "phishing",
            "malicious",
            "bank",
            "zeus",
            "zbot",
            "tinba",
            "stealer",
            "miner",
            "ponmocup",
            "ave maria",
            "artemis",
            "nymaim",
            "emotet",
            "redline stealer",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "ransomware",
            "matsnu",
            "kraken",
            "simda",
            "citadel",
            "vawtrak",
            "tag count",
            "mon oct",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "netsky",
            "team malware",
            "blacklist http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 222,
            "FileHash-SHA1": 122,
            "FileHash-SHA256": 2023,
            "URL": 6912,
            "domain": 1503,
            "hostname": 1755,
            "CVE": 1
          },
          "indicator_count": 12538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "848 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7c9f6bf793f823e6398",
          "name": "Qakbot attacks. As strong as before?",
          "description": "",
          "modified": "2023-12-06T16:56:41.266000",
          "created": "2023-12-06T16:56:41.266000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "hostname": 1177,
            "FileHash-SHA256": 2150,
            "domain": 620,
            "URL": 3016,
            "FileHash-MD5": 519,
            "FileHash-SHA1": 292
          },
          "indicator_count": 7775,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a552ac0b6570454709f7",
          "name": "Kelowna detachment - British Columbia         (Pulse created by ellenmmm)",
          "description": "",
          "modified": "2023-12-06T16:46:09.708000",
          "created": "2023-12-06T16:46:09.708000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 15,
            "URL": 1349,
            "FileHash-MD5": 1308,
            "FileHash-SHA1": 1314,
            "FileHash-SHA256": 4898,
            "hostname": 1401,
            "email": 62,
            "domain": 1237,
            "CIDR": 8
          },
          "indicator_count": 11592,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709fb3b919327802eaa6c5",
          "name": "Kelowna detachment - British Columbia",
          "description": "",
          "modified": "2023-12-06T16:22:11.032000",
          "created": "2023-12-06T16:22:11.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 15,
            "URL": 1349,
            "FileHash-MD5": 1308,
            "FileHash-SHA1": 1314,
            "FileHash-SHA256": 4898,
            "hostname": 1401,
            "email": 62,
            "domain": 1237,
            "CIDR": 8
          },
          "indicator_count": 11592,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fa9e514ca975b6db5ca",
          "name": "NYTIMES.COM",
          "description": "",
          "modified": "2023-12-06T14:05:29.348000",
          "created": "2023-12-06T14:05:29.348000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 936,
            "hostname": 1927,
            "URL": 4576,
            "domain": 989,
            "email": 2,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 4
          },
          "indicator_count": 8437,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f3a39d889e6d85ae6e0",
          "name": "more of the same fake or compromised pages on websites",
          "description": "",
          "modified": "2023-12-06T14:03:38.459000",
          "created": "2023-12-06T14:03:38.459000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 381,
            "domain": 237,
            "URL": 1245,
            "hostname": 539
          },
          "indicator_count": 2403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f02c459cc8bcaa5ebeb7a",
          "name": "Targeted hacking via malicious DGA insurance domains AIGcom",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T01:11:32.672000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653db32c6a6193714e513695",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db044432cdee91e2f5d1c",
          "name": "AIG Hacked or Spoofed website?",
          "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:07:16.410000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db0487ec8c7a4c0b1ef0e",
          "name": "AIG Hacked or Spoofed website?",
          "description": "Extremely strange & disturbing report.  Disruption under Cisco Umbrella hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:07:20.916000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db12d71978ca34e49e88e",
          "name": "Hacking stemming from malicious DGA Insurance domains under Cisco Umbrella",
          "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:11:09.672000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570",
            "defense entity fraud?"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653db32c6a6193714e513695",
          "name": "Targeted hacking via malicious DGA insurance domains AIGcom  | Host: am1mxi05.aig.com | IP: 167.230.100.44",
          "description": "Extremely strange & disturbing report. A disruption at root of Cisco hack may be linked to a matrix of DGA insurance domains. AIG.com. Unclear validity. Spoof Domain, a tool AIG uses? Targets Tsara Brashears. Tulach unlikely a person more likely a profile accessed by entities. Rogue attornoes, etc. Large smear campaign wild cover up including death threats. Reports assert target's been harassed & harmed for years. Is this a cybercrime? Example of  malicious tools deployed against innocents.\nMissing STSH\nVerdict: Concerning potential for physical harm to Target or associates\nWhy: Avoid lawsuit and press / reputation \nWho: ?\nIP: 167.230.100.44\nHost: am1mxi05.aig.com\nRegistrar: CSC CORPORATE DOMAINS, INC.\nCreation date: 28 years ago\nHard to understand.",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-29T01:19:40.692000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f05ff39b2dee54b89d17a",
          "name": "AIG Hacked or Spoofed website?",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T01:25:19.036000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653db0487ec8c7a4c0b1ef0e",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f21878bcd05f7d594ff86",
          "name": " AIG Hacked or Spoofed website?",
          "description": "",
          "modified": "2023-11-27T23:02:02.229000",
          "created": "2023-10-30T03:22:47.684000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653db044432cdee91e2f5d1c",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "874 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "api-stage.pornhub.com",
        "https://t.me/hermitspyware/24",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "http://watchhers.net/index.php [remote attackers | malware spreader]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "www-stage40.pornhub.com",
        "http://subtitles.rest7.com/subs/The.Expanse.S03E11.720p.HDTV.x264-KILLERS[eztv].mkv",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "match.pegasus.isi.edu",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
        "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "images.ctfassets.net",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
        "http://download.virtualbox.org/virtualbox/debian",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "dns.trackgroup.net",
        "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
        "wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "www2.blackbagtech.com [hidden users included]",
        "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
        "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
        "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "work.a-poster.info",
        "https://tulach.cc/",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "https://www.virustotal.com/gui/domain/paypal-secure-id-login-webobjects-support-home.e-pornosex.com/community",
        "https://cellebrite.com/en/federal-government/  [Pegasus ck privilege collection]",
        "https://safebae.org/",
        "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
        "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
        "hanmail.net",
        "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "http://www.apple.com/appleca/AppleIncRootCertificate.cer",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://imazing.com/guides/detect-pegasus-and-other-spyware-on-iphone",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "http://pegasus.diskel.co.uk/ [phishing]",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "asp.net",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "fds.cellebrite.com",
        "http://gmpg.org/xfn/11 [HTTrack]",
        "go.sabey.com",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
        "https://work.a-poster.info",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "www.hallrender.com",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "www.videolan.org [info solutions]",
        "http://www1.mychartahn.org/?tm=1&subid4=1671014887.0191400000&kw=Patient+Portal&KW1=Patient+Access+Network&KW2=Patient+Self+Check+In+System&KW3=Electronic+Health+Record+EHR+System&KW4=Patient+Appointment+Scheduling+System&KW5=Medical+Billing+System+Software&KW6=Patient+Financial+Assistance&searchbox=0&domainname=0&backfill=0",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "http://www.01tracks.com/happy-customers",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "newbrazzers.com [y8.com]",
        "http://flexlucky.com/isurvey/en/?devicemodel=iPhone&carrier=\u00aeion=Tbilisi&brand=Apple&browser=GoogleApp&prize=cur&u=track.bawiwia.com&isp=JSCGlobalErty&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=GE&click_id=wuo4jm6db011lufu2f8h138c&partner=5658402&skip=yes&frame={frame}&cost=0.010100&lang=en",
        "defenselawyernj.com",
        "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
        "192.229.211.108 [Tracking & Virus Network]",
        "remote.aciscomputers.com",
        "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg",
        "healthcare.greatcall.com [fake call centers | PHI & PII info stealers]",
        "https://track.toccha.com/978eb025-0a62-46fa-827c-d71aa0524818?zoneid=5939372&ua=high&subzone_id=3038557&set=social&country=SY&region=49&isp=syriatelmobiletelecom&useragent=Mozilla/5.0",
        "deadlyexploits.com | deadlysymbol.com |",
        "https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities Source",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "https://www.pornhub.com/video/search?search=tsara+brashears [Apple Password Cracker]",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "nr-data.net [Apple Private Data Collection]",
        "hyundai-smg.com | http://hyundai-smg.com/index.php?route=information/contact | http://hyundai-smg.com/index.php?route=information/contact",
        "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "9.6.zip - SQLi",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
        "http://dropbox.com/ [ intrusions/ dropbox stealer]",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/image-recognition-and-searcher/id1450230225",
        "s3.amazonaws.com [ metro T-Mobile spyware porn]",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
        "114.114.114.114",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "sabey.com",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "scripting-sandbox-dns.bunny.net",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "114.114.114.114 [Tulach]",
        "cellebrite.com | https://cellebrite.com/en/federal-government/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "attorney-marketing-specialists.com ?",
        "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
        "me.com [Pegasus]",
        "http://images.contact.acams.org/",
        "contact_pki@apple.com [CAA mail contact] [17.253.142.4 Apple CAA IP]",
        "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
        "a-poster.info",
        "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
        "37.1.217.172 [scanning host]",
        "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com",
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
        "cellebrite.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "NSO"
          ],
          "malware_families": [
            "Domains",
            "Goldfinder",
            "Trojan.agent.fryx",
            "Hallrender",
            "Win32:ransomx-gen\\ [ransom]",
            "Kimsuky",
            "Icefog",
            "Et",
            "Blacknet",
            "Neurovt",
            "Skynet",
            "Nanocore",
            "Pegasus",
            "Trojanspy",
            "Alf:trojan:win32/cassini_f28c33a2",
            "Immortal stealer",
            "Cl0p",
            "Trojan.shellrunner/emailworm",
            "Hacktool.cheatengine",
            "Nids",
            "Virtool:win32/tofsee",
            "Cobalt strike",
            "Zerobot",
            "Ransomexx",
            "Sibot",
            "Mal_tofsee",
            "Maltiverse",
            "Alf:heraklezeval:worm:win32/mimail!rfn",
            "Webtoolbar",
            "Trojan:win32/smokeloader",
            "Chinese",
            "Worm:win32/ganelp.a",
            "Hacktool.bruteforce",
            "Pegasus for android - mob-s0032",
            "Trojan:win32/emotet.yl",
            "Gandcrab",
            "Sabey",
            "Trojan:win32/comspec",
            "Mimikatz",
            "Trojanx",
            "Pegasus - mob-s0005",
            "Azorult",
            "Ducktail",
            "Opencandy",
            "Quasar rat",
            "Alf:trojandownloader:powershell/ploprolo.db",
            "Artemis",
            "Pegasus for ios - s0289",
            "Trojandownloader:win32/cutwail",
            "Raccoon stealer",
            "Mirai",
            "Ransomware",
            "Callback phishing",
            "Formbook",
            "Tulach",
            "Trojan:win64/coinminer.we",
            "Pws:win32/zbot!ci",
            "Firehol",
            "Worm:win32/lightmoon.h",
            "Nymaim",
            "Yixun",
            "Hiddentear",
            "Looquer",
            "Exodus",
            "Win32:acecrypter-b [cryp]",
            "Tulach malware",
            "Inmortal",
            "Tofsee",
            "Appleservice",
            "Trojan:win32/installcore",
            "Bazarcall",
            "Njrat",
            "Goldmax - s0588",
            "Trojan",
            "Ransom.stopcryptpmf.",
            "Backdoor:win32/tofsee.t",
            "Emotet",
            "Hacktool",
            "Trojan.redcap/python",
            "Content reputation",
            "Pws:win32/raven"
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Patient",
            "Individual",
            "Survivor",
            "Civilian society",
            "Media"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69e30ffa710fafb6d651ca89",
      "name": "Kelowna detachment - British Columbia by streamminingex",
      "description": "",
      "modified": "2026-04-18T05:46:36.582000",
      "created": "2026-04-18T05:00:42.166000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6570a552ac0b6570454709f7",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 15,
        "URL": 1354,
        "FileHash-MD5": 1308,
        "FileHash-SHA1": 1314,
        "FileHash-SHA256": 4898,
        "hostname": 1401,
        "email": 62,
        "domain": 1239,
        "CIDR": 8
      },
      "indicator_count": 11599,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e30ffde212f52470137868",
      "name": "Kelowna detachment - British Columbia by streamminingex",
      "description": "",
      "modified": "2026-04-18T05:46:26.897000",
      "created": "2026-04-18T05:00:45.780000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6570a552ac0b6570454709f7",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 15,
        "URL": 1358,
        "FileHash-MD5": 1308,
        "FileHash-SHA1": 1314,
        "FileHash-SHA256": 4898,
        "hostname": 1405,
        "email": 62,
        "domain": 1242,
        "CIDR": 8
      },
      "indicator_count": 11610,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b2b76c9a490b69b6a085b3",
      "name": "Exodus/cellbrite clone by Q Vashti",
      "description": "",
      "modified": "2026-03-12T12:54:04.160000",
      "created": "2026-03-12T12:54:04.160000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "whois record",
        "contacted",
        "pegasus",
        "resolutions",
        "communicating",
        "sa victim",
        "assaulter",
        "quasar",
        "brian sabey",
        "go.sabey",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "samples",
        "united",
        "aaaa",
        "status",
        "susp",
        "search",
        "passive dns",
        "urls",
        "domain",
        "creation date",
        "date",
        "next",
        "show",
        "domain related",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "scan endpoints",
        "all octoseek",
        "url https",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "all search",
        "otx octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "files",
        "china unknown",
        "as4134 chinanet",
        "unknown",
        "name servers",
        "showing",
        "namesilo",
        "domain name",
        "dynadot llc",
        "as8075",
        "script urls",
        "netherlands",
        "a domains",
        "capture",
        "asnone united",
        "record value",
        "expiration date",
        "entries",
        "cname",
        "tulach",
        "algorithm",
        "v3 serial",
        "number",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "x509v3 extended",
        "info",
        "first",
        "server",
        "available from",
        "iana id",
        "registrar abuse",
        "registrar url",
        "registrar whois",
        "abuse contact",
        "email",
        "registry domain",
        "code",
        "win32 exe",
        "ufed iphone",
        "cellebrite ufed",
        "setup",
        "tjprojmain",
        "ufed4pc",
        "win32 dll",
        "detections type",
        "name",
        "responder",
        "exodus",
        "android",
        "office open",
        "xml document",
        "cellebrite",
        "type name",
        "pdf cellebrite",
        "ufed release",
        "cellbrite",
        "privilege https",
        "targets sa",
        "survivor",
        "getprocaddress",
        "indicator",
        "prefetch8",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "file",
        "pattern match",
        "observed email",
        "path",
        "factory",
        "hybrid",
        "general",
        "model",
        "comspec",
        "click",
        "title",
        "page",
        "body doctype",
        "quoth",
        "raven",
        "gmt content",
        "type",
        "vary",
        "accept",
        "october",
        "december",
        "copy",
        "execution",
        "awful",
        "referrer",
        "april",
        "kimsuky",
        "malicious",
        "crypto",
        "startpage",
        "hacktool",
        "installer",
        "tofsee",
        "historical ssl",
        "threat roundup",
        "phishing",
        "utc submissions",
        "submitters",
        "csc corporate",
        "domains",
        "twitter",
        "dropbox",
        "incapsula",
        "summary iocs",
        "graph community",
        "registrarsafe",
        "gandi sas",
        "google llc",
        "amazon02",
        "google",
        "akamaias",
        "facebook",
        "service",
        "patch",
        "namecheapnet",
        "cloudflarenet",
        "amazonaes",
        "gmo internet",
        "apple",
        "tsara brashears",
        "keylogger"
      ],
      "references": [
        "https://tulach.cc/",
        "cellebrite.com | https://cellebrite.com/en/federal-government/",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "https://twitter.com/PORNO_SEXYBABES",
        "hanmail.net",
        "114.114.114.114",
        "work.a-poster.info",
        "www-stage40.pornhub.com",
        "go.sabey.com",
        "sabey.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Exodus",
          "display_name": "Exodus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "PWS:Win32/Raven",
          "display_name": "PWS:Win32/Raven",
          "target": "/malware/PWS:Win32/Raven"
        },
        {
          "id": "Kimsuky",
          "display_name": "Kimsuky",
          "target": null
        },
        {
          "id": "VirTool:Win32/Tofsee",
          "display_name": "VirTool:Win32/Tofsee",
          "target": "/malware/VirTool:Win32/Tofsee"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6916e098df39114161354b23",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4295,
        "FileHash-MD5": 322,
        "FileHash-SHA1": 296,
        "FileHash-SHA256": 3255,
        "domain": 2911,
        "hostname": 2894,
        "CVE": 2,
        "email": 9,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 13986,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "39 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a9e7c572b8411d126215a6",
      "name": "@scoreblue callback clone",
      "description": "",
      "modified": "2026-03-06T05:11:18.020000",
      "created": "2026-03-05T20:29:57.169000",
      "tags": [
        "acceptencoding",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers xcache",
        "wp engine",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "samples",
        "contacted",
        "apple",
        "ssl certificate",
        "whois record",
        "contacted",
        "historical ssl",
        "referrer",
        "execution",
        "tsara brashears",
        "apple ios",
        "historical",
        "communicating",
        "copy",
        "attack",
        "njrat",
        "ransomware",
        "hacktool",
        "metro",
        "malicious",
        "crypto",
        "installer",
        "awful",
        "startpage",
        "callback phishing",
        "safebae",
        "catherine daisy coleman",
        "pegasus",
        "nso",
        "kb font",
        "january",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "kb document",
        "general full",
        "url http",
        "low risk",
        "sucuri firewall",
        "malware found",
        "site",
        "unknown",
        "low security",
        "risk",
        "website malware",
        "security no",
        "protect",
        "html internet",
        "html document",
        "unicode text",
        "utf8 text",
        "no data",
        "tag count",
        "sample summary",
        "sample",
        "detection list",
        "blacklist",
        "count blacklist",
        "tag tag",
        "anchor hrefs",
        "wordpress",
        "html info",
        "title safebae",
        "anyone else",
        "meta tags",
        "wpbakery page",
        "builder",
        "slider plugin",
        "script tags",
        "passive dns",
        "urls",
        "a nxdomain",
        "scan endpoints",
        "all scoreblue",
        "hostname",
        "pulse pulses",
        "files",
        "domain",
        "files ip",
        "united",
        "status",
        "as13768 aptum",
        "date",
        "moved",
        "creation date",
        "search",
        "record value",
        "body",
        "log id",
        "gmtn",
        "go daddy",
        "authority",
        "tls web",
        "arizona",
        "scottsdale",
        "ca issuers",
        "false",
        "as30148 sucuri",
        "a domains",
        "gmt content",
        "ipv4",
        "win64",
        "back",
        "linux mint",
        "hacking",
        "brian sabey",
        "tracking",
        "hallrender",
        "staging",
        "dns",
        "network",
        "control",
        "bazar"
      ],
      "references": [
        "https://safebae.org/",
        "www.hallrender.com",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
        "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
        "s3.amazonaws.com [ metro T-Mobile spyware porn]",
        "9.6.zip - SQLi",
        "dns.trackgroup.net",
        "nr-data.net [Apple Private Data Collection]",
        "scripting-sandbox-dns.bunny.net",
        "http://www.01tracks.com/happy-customers",
        "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
        "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
        "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
        "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
        "deadlyexploits.com | deadlysymbol.com |",
        "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Callback Phishing",
          "display_name": "Callback Phishing",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "BazarCall",
          "display_name": "BazarCall",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65b8a052c4160dbd76054f8a",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2802,
        "URL": 3267,
        "domain": 1459,
        "hostname": 1268,
        "FileHash-MD5": 227,
        "FileHash-SHA1": 144,
        "CVE": 2,
        "email": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 9172,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "45 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6952febb1dbcf05ee601f050",
      "name": "Pegasus Ongoing l Cellbrite | Exodus | Brian Sabey | HallRender | Tulach (1.29.24)",
      "description": "",
      "modified": "2025-12-29T22:20:43.238000",
      "created": "2025-12-29T22:20:43.238000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "whois record",
        "contacted",
        "pegasus",
        "resolutions",
        "communicating",
        "sa victim",
        "assaulter",
        "quasar",
        "brian sabey",
        "go.sabey",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "samples",
        "united",
        "aaaa",
        "status",
        "susp",
        "search",
        "passive dns",
        "urls",
        "domain",
        "creation date",
        "date",
        "next",
        "show",
        "domain related",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "scan endpoints",
        "all octoseek",
        "url https",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "all search",
        "otx octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "files",
        "china unknown",
        "as4134 chinanet",
        "unknown",
        "name servers",
        "showing",
        "namesilo",
        "domain name",
        "dynadot llc",
        "as8075",
        "script urls",
        "netherlands",
        "a domains",
        "capture",
        "asnone united",
        "record value",
        "expiration date",
        "entries",
        "cname",
        "tulach",
        "algorithm",
        "v3 serial",
        "number",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "x509v3 extended",
        "info",
        "first",
        "server",
        "available from",
        "iana id",
        "registrar abuse",
        "registrar url",
        "registrar whois",
        "abuse contact",
        "email",
        "registry domain",
        "code",
        "win32 exe",
        "ufed iphone",
        "cellebrite ufed",
        "setup",
        "tjprojmain",
        "ufed4pc",
        "win32 dll",
        "detections type",
        "name",
        "responder",
        "exodus",
        "android",
        "office open",
        "xml document",
        "cellebrite",
        "type name",
        "pdf cellebrite",
        "ufed release",
        "cellbrite",
        "privilege https",
        "targets sa",
        "survivor",
        "getprocaddress",
        "indicator",
        "prefetch8",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "file",
        "pattern match",
        "observed email",
        "path",
        "factory",
        "hybrid",
        "general",
        "model",
        "comspec",
        "click",
        "title",
        "page",
        "body doctype",
        "quoth",
        "raven",
        "gmt content",
        "type",
        "vary",
        "accept",
        "october",
        "december",
        "copy",
        "execution",
        "awful",
        "referrer",
        "april",
        "kimsuky",
        "malicious",
        "crypto",
        "startpage",
        "hacktool",
        "installer",
        "tofsee",
        "historical ssl",
        "threat roundup",
        "phishing",
        "utc submissions",
        "submitters",
        "csc corporate",
        "domains",
        "twitter",
        "dropbox",
        "incapsula",
        "summary iocs",
        "graph community",
        "registrarsafe",
        "gandi sas",
        "google llc",
        "amazon02",
        "google",
        "akamaias",
        "facebook",
        "service",
        "patch",
        "namecheapnet",
        "cloudflarenet",
        "amazonaes",
        "gmo internet",
        "apple",
        "tsara brashears",
        "keylogger"
      ],
      "references": [
        "https://tulach.cc/",
        "cellebrite.com | https://cellebrite.com/en/federal-government/",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "https://twitter.com/PORNO_SEXYBABES",
        "hanmail.net",
        "114.114.114.114",
        "work.a-poster.info",
        "www-stage40.pornhub.com",
        "go.sabey.com",
        "sabey.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Exodus",
          "display_name": "Exodus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "PWS:Win32/Raven",
          "display_name": "PWS:Win32/Raven",
          "target": "/malware/PWS:Win32/Raven"
        },
        {
          "id": "Kimsuky",
          "display_name": "Kimsuky",
          "target": null
        },
        {
          "id": "VirTool:Win32/Tofsee",
          "display_name": "VirTool:Win32/Tofsee",
          "target": "/malware/VirTool:Win32/Tofsee"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65b80a20bbcd0eb305a740ec",
      "export_count": 29402,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4101,
        "FileHash-MD5": 322,
        "FileHash-SHA1": 296,
        "FileHash-SHA256": 3155,
        "domain": 2894,
        "hostname": 2847,
        "CVE": 2,
        "email": 9,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 13628,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "112 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69458259401a612102d02679",
      "name": "NSO Group ( original pulse degraded by a delete service) ",
      "description": "",
      "modified": "2025-12-19T16:50:33.337000",
      "created": "2025-12-19T16:50:33.337000",
      "tags": [
        "iocs",
        "urls https",
        "generic malware",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "detection list",
        "luca stealer",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malicious url",
        "alexa top",
        "malicious site",
        "malware site",
        "unsafe",
        "trojanx",
        "malware",
        "metastealer",
        "alexa",
        "dbatloader",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "trojan",
        "irata",
        "allakore",
        "trojanspy",
        "hash",
        "ms windows",
        "pe32",
        "write c",
        "t1045",
        "show",
        "high",
        "search",
        "pe32 executable",
        "copy",
        "write",
        "win64",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "entries",
        "powershell",
        "mfc mfc",
        "united",
        "as54113",
        "as14061",
        "as9009 m247",
        "whitelisted",
        "status",
        "united kingdom",
        "name servers",
        "aaaa",
        "passive dns",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "files domain",
        "files related",
        "pulses otx",
        "pulses",
        "as15133 verizon",
        "cname",
        "as16552 tiggee",
        "as20940",
        "domain",
        "as16625 akamai",
        "creation date",
        "body",
        "unknown",
        "ipv4",
        "softcnapp",
        "trojandropper",
        "epaeedpaer",
        "eoaee",
        "qaexedoae",
        "showing",
        "sha256",
        "strings",
        "august",
        "files",
        "main",
        "germany asn",
        "win32",
        "miner",
        "next",
        "asnone united",
        "moved",
        "as8987 amazon",
        "trojanproxy",
        "virtool",
        "yara rule",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "present sep",
        "twitter",
        "accept",
        "certificate",
        "record value",
        "dynamicloader",
        "medium",
        "dynamic",
        "network",
        "reads",
        "port",
        "anomaly",
        "overview domain",
        "tags",
        "related tags",
        "dns status",
        "hostname query",
        "type address",
        "first seen",
        "seen asn",
        "country unknown",
        "nxdomain",
        "a nxdomain",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "encrypt",
        "hostname",
        "files ip",
        "address domain",
        "france",
        "emails",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "contacted",
        "wine emulator",
        "ip address",
        "script urls",
        "date",
        "meta",
        "flag united",
        "url http",
        "pulse http",
        "http",
        "as8075",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "servers",
        "expiration date",
        "sorry something",
        "gmt content",
        "canada unknown",
        "error",
        "backend",
        "france unknown",
        "alfper",
        "gmt contenttype",
        "apache",
        "exploit",
        "as15169 google",
        "wireless",
        "as23027 boingo",
        "pulse submit",
        "url analysis",
        "location united",
        "nso group",
        "pegasus spyware",
        "url indicator",
        "active created",
        "modified",
        "email",
        "nso",
        "germany",
        "pattern",
        "susp",
        "msil",
        "akamai",
        "gmt connection",
        "netherlands",
        "ovhfr",
        "ns nxdomain",
        "australia",
        "redacted for",
        "andariel group",
        "defense",
        "andariel",
        "check",
        "opera ua",
        "et trojan",
        "attempts",
        "april",
        "zbot",
        "possible zeus",
        "as140107 citis",
        "america asn",
        "as22612",
        "as397240",
        "as19527 google",
        "apple"
      ],
      "references": [
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
      ],
      "public": 1,
      "adversary": "NSO",
      "targeted_countries": [
        "United States of America",
        "Sweden",
        "Germany",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "France",
        "Spain",
        "Canada",
        "Singapore",
        "Japan",
        "Korea, Republic of",
        "Ireland",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan:Win64/CoinMiner.WE",
          "display_name": "Trojan:Win64/CoinMiner.WE",
          "target": "/malware/Trojan:Win64/CoinMiner.WE"
        },
        {
          "id": "Trojan:Win32/SmokeLoader",
          "display_name": "Trojan:Win32/SmokeLoader",
          "target": "/malware/Trojan:Win32/SmokeLoader"
        },
        {
          "id": "PWS:Win32/Zbot!CI",
          "display_name": "PWS:Win32/Zbot!CI",
          "target": "/malware/PWS:Win32/Zbot!CI"
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1138",
          "name": "Application Shimming",
          "display_name": "T1138 - Application Shimming"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "66f55cdc8257c7fa223ed052",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2852,
        "FileHash-SHA1": 2194,
        "FileHash-SHA256": 6649,
        "domain": 1881,
        "hostname": 1706,
        "URL": 553,
        "CVE": 3,
        "email": 25
      },
      "indicator_count": 15863,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "122 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6916e098df39114161354b23",
      "name": "Exodus l Cellbrite \u2022 Pegasus | Brian Sabey | HallRender | Tulach ",
      "description": "",
      "modified": "2025-12-14T07:05:42.106000",
      "created": "2025-11-14T07:56:08.872000",
      "tags": [
        "ssl certificate",
        "network",
        "malware",
        "whois record",
        "contacted",
        "pegasus",
        "resolutions",
        "communicating",
        "sa victim",
        "assaulter",
        "quasar",
        "brian sabey",
        "go.sabey",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "samples",
        "united",
        "aaaa",
        "status",
        "susp",
        "search",
        "passive dns",
        "urls",
        "domain",
        "creation date",
        "date",
        "next",
        "show",
        "domain related",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "scan endpoints",
        "all octoseek",
        "url https",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "all search",
        "otx octoseek",
        "hostname",
        "pulse submit",
        "url analysis",
        "files",
        "china unknown",
        "as4134 chinanet",
        "unknown",
        "name servers",
        "showing",
        "namesilo",
        "domain name",
        "dynadot llc",
        "as8075",
        "script urls",
        "netherlands",
        "a domains",
        "capture",
        "asnone united",
        "record value",
        "expiration date",
        "entries",
        "cname",
        "tulach",
        "algorithm",
        "v3 serial",
        "number",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "x509v3 extended",
        "info",
        "first",
        "server",
        "available from",
        "iana id",
        "registrar abuse",
        "registrar url",
        "registrar whois",
        "abuse contact",
        "email",
        "registry domain",
        "code",
        "win32 exe",
        "ufed iphone",
        "cellebrite ufed",
        "setup",
        "tjprojmain",
        "ufed4pc",
        "win32 dll",
        "detections type",
        "name",
        "responder",
        "exodus",
        "android",
        "office open",
        "xml document",
        "cellebrite",
        "type name",
        "pdf cellebrite",
        "ufed release",
        "cellbrite",
        "privilege https",
        "targets sa",
        "survivor",
        "getprocaddress",
        "indicator",
        "prefetch8",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "file",
        "pattern match",
        "observed email",
        "path",
        "factory",
        "hybrid",
        "general",
        "model",
        "comspec",
        "click",
        "title",
        "page",
        "body doctype",
        "quoth",
        "raven",
        "gmt content",
        "type",
        "vary",
        "accept",
        "october",
        "december",
        "copy",
        "execution",
        "awful",
        "referrer",
        "april",
        "kimsuky",
        "malicious",
        "crypto",
        "startpage",
        "hacktool",
        "installer",
        "tofsee",
        "historical ssl",
        "threat roundup",
        "phishing",
        "utc submissions",
        "submitters",
        "csc corporate",
        "domains",
        "twitter",
        "dropbox",
        "incapsula",
        "summary iocs",
        "graph community",
        "registrarsafe",
        "gandi sas",
        "google llc",
        "amazon02",
        "google",
        "akamaias",
        "facebook",
        "service",
        "patch",
        "namecheapnet",
        "cloudflarenet",
        "amazonaes",
        "gmo internet",
        "apple",
        "tsara brashears",
        "keylogger"
      ],
      "references": [
        "https://tulach.cc/",
        "cellebrite.com | https://cellebrite.com/en/federal-government/",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "https://twitter.com/PORNO_SEXYBABES",
        "hanmail.net",
        "114.114.114.114",
        "work.a-poster.info",
        "www-stage40.pornhub.com",
        "go.sabey.com",
        "sabey.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Exodus",
          "display_name": "Exodus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "PWS:Win32/Raven",
          "display_name": "PWS:Win32/Raven",
          "target": "/malware/PWS:Win32/Raven"
        },
        {
          "id": "Kimsuky",
          "display_name": "Kimsuky",
          "target": null
        },
        {
          "id": "VirTool:Win32/Tofsee",
          "display_name": "VirTool:Win32/Tofsee",
          "target": "/malware/VirTool:Win32/Tofsee"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65a76c2901b34c79a681596d",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4295,
        "FileHash-MD5": 322,
        "FileHash-SHA1": 296,
        "FileHash-SHA256": 3255,
        "domain": 2911,
        "hostname": 2894,
        "CVE": 2,
        "email": 9,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 13986,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "127 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "681386d75c34469176686756",
      "name": "x.com/KulinskiArkadi",
      "description": "",
      "modified": "2025-05-31T14:01:10.044000",
      "created": "2025-05-01T14:36:07.422000",
      "tags": [
        "script",
        "etag",
        "sharing",
        "cors",
        "mediatype",
        "mediasubtype",
        "contenttype",
        "header",
        "combination",
        "compression",
        "encrypt",
        "cookie",
        "critical",
        "twitter",
        "iframe",
        "insert",
        "info",
        "error",
        "suspicious",
        "find",
        "screen",
        "grok",
        "body"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 471,
        "CIDR": 34,
        "FileHash-MD5": 9,
        "FileHash-SHA1": 5,
        "FileHash-SHA256": 1177,
        "domain": 214,
        "hostname": 430,
        "email": 2
      },
      "indicator_count": 2342,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "324 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f55cdc8257c7fa223ed052",
      "name": "NSO Group attacks Uptown Denver Neighborhood",
      "description": "Stems from 'hushed' cyber attack that lasted for several days in surrounding neighborhoods near (MSU) Metro State University. Pegasus spyware detected. The attack affected devices, bypassed credentials , passwords and compromised networks. Remedy: reset network multiple times. \n\nI'm not implying attack disseminates from MSU. \nSpectrum.com and Quantum Fiber Cyber Folks .PL related / MSU\nSoftware used \n\n\n\n \n*Cyber Folks .pl *https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
      "modified": "2024-10-26T12:05:43.885000",
      "created": "2024-09-26T13:08:44.341000",
      "tags": [
        "iocs",
        "urls https",
        "generic malware",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "detection list",
        "luca stealer",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malicious url",
        "alexa top",
        "malicious site",
        "malware site",
        "unsafe",
        "trojanx",
        "malware",
        "metastealer",
        "alexa",
        "dbatloader",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "trojan",
        "irata",
        "allakore",
        "trojanspy",
        "hash",
        "ms windows",
        "pe32",
        "write c",
        "t1045",
        "show",
        "high",
        "search",
        "pe32 executable",
        "copy",
        "write",
        "win64",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "entries",
        "powershell",
        "mfc mfc",
        "united",
        "as54113",
        "as14061",
        "as9009 m247",
        "whitelisted",
        "status",
        "united kingdom",
        "name servers",
        "aaaa",
        "passive dns",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "files domain",
        "files related",
        "pulses otx",
        "pulses",
        "as15133 verizon",
        "cname",
        "as16552 tiggee",
        "as20940",
        "domain",
        "as16625 akamai",
        "creation date",
        "body",
        "unknown",
        "ipv4",
        "softcnapp",
        "trojandropper",
        "epaeedpaer",
        "eoaee",
        "qaexedoae",
        "showing",
        "sha256",
        "strings",
        "august",
        "files",
        "main",
        "germany asn",
        "win32",
        "miner",
        "next",
        "asnone united",
        "moved",
        "as8987 amazon",
        "trojanproxy",
        "virtool",
        "yara rule",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "present sep",
        "twitter",
        "accept",
        "certificate",
        "record value",
        "dynamicloader",
        "medium",
        "dynamic",
        "network",
        "reads",
        "port",
        "anomaly",
        "overview domain",
        "tags",
        "related tags",
        "dns status",
        "hostname query",
        "type address",
        "first seen",
        "seen asn",
        "country unknown",
        "nxdomain",
        "a nxdomain",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "encrypt",
        "hostname",
        "files ip",
        "address domain",
        "france",
        "emails",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "contacted",
        "wine emulator",
        "ip address",
        "script urls",
        "date",
        "meta",
        "flag united",
        "url http",
        "pulse http",
        "http",
        "as8075",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "servers",
        "expiration date",
        "sorry something",
        "gmt content",
        "canada unknown",
        "error",
        "backend",
        "france unknown",
        "alfper",
        "gmt contenttype",
        "apache",
        "exploit",
        "as15169 google",
        "wireless",
        "as23027 boingo",
        "pulse submit",
        "url analysis",
        "location united",
        "nso group",
        "pegasus spyware",
        "url indicator",
        "active created",
        "modified",
        "email",
        "nso",
        "germany",
        "pattern",
        "susp",
        "msil",
        "akamai",
        "gmt connection",
        "netherlands",
        "ovhfr",
        "ns nxdomain",
        "australia",
        "redacted for",
        "andariel group",
        "defense",
        "andariel",
        "check",
        "opera ua",
        "et trojan",
        "attempts",
        "april",
        "zbot",
        "possible zeus",
        "as140107 citis",
        "america asn",
        "as22612",
        "as397240",
        "as19527 google",
        "apple"
      ],
      "references": [
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
      ],
      "public": 1,
      "adversary": "NSO",
      "targeted_countries": [
        "United States of America",
        "Sweden",
        "Germany",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "France",
        "Spain",
        "Canada",
        "Singapore",
        "Japan",
        "Korea, Republic of",
        "Ireland",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan:Win64/CoinMiner.WE",
          "display_name": "Trojan:Win64/CoinMiner.WE",
          "target": "/malware/Trojan:Win64/CoinMiner.WE"
        },
        {
          "id": "Trojan:Win32/SmokeLoader",
          "display_name": "Trojan:Win32/SmokeLoader",
          "target": "/malware/Trojan:Win32/SmokeLoader"
        },
        {
          "id": "PWS:Win32/Zbot!CI",
          "display_name": "PWS:Win32/Zbot!CI",
          "target": "/malware/PWS:Win32/Zbot!CI"
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1138",
          "name": "Application Shimming",
          "display_name": "T1138 - Application Shimming"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2852,
        "FileHash-SHA1": 2194,
        "FileHash-SHA256": 6649,
        "domain": 1881,
        "hostname": 1706,
        "URL": 553,
        "CVE": 3,
        "email": 25
      },
      "indicator_count": 15863,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "541 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aab954f5f03a1f2906b39c",
      "name": "Zerobot",
      "description": "",
      "modified": "2024-10-12T07:01:26.973000",
      "created": "2024-01-19T18:03:00.966000",
      "tags": [
        "ssl certificate",
        "whois record",
        "referrer",
        "historical ssl",
        "resolutions",
        "whois whois",
        "communicating",
        "subdomains",
        "contacted",
        "c1on",
        "cmdwget http",
        "metro",
        "zerobot",
        "execution",
        "skynet",
        "june"
      ],
      "references": [
        "https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities Source"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ZeroBot",
          "display_name": "ZeroBot",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65aa168aeddea4851fc47cc3",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 123,
        "FileHash-SHA1": 123,
        "FileHash-SHA256": 2498,
        "domain": 1600,
        "hostname": 2749,
        "URL": 6303,
        "CVE": 1
      },
      "indicator_count": 13397,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "555 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "papichconstructions.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "papichconstructions.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776724441.834011
}