{
  "type": "Domain",
  "indicator": "projectzero.google",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/projectzero.google",
    "alexa": "http://www.alexa.com/siteinfo/projectzero.google",
    "indicator": "projectzero.google",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3840109709,
      "indicator": "projectzero.google",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "69dc04c12782d2d76c111a93",
          "name": "VirusTotal \u2022 PsBanker \u2022 Attacked / Blocked",
          "description": "",
          "modified": "2026-04-12T20:46:57.338000",
          "created": "2026-04-12T20:46:57.338000",
          "tags": [
            "indicator role",
            "active related",
            "ck ids",
            "files",
            "information",
            "discovery",
            "mitre att",
            "pattern match",
            "ck id",
            "ck matrix",
            "ascii text",
            "united",
            "binary file",
            "april",
            "hybrid",
            "apikey",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "protocol",
            "learn",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "execution att",
            "related pulses",
            "dll read",
            "function read",
            "icmp traffic",
            "machineguid",
            "systembiosdate",
            "total",
            "read",
            "write",
            "network_icmp",
            "js_eval",
            "recon_fingerprint",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "tls handshake",
            "execution",
            "dock",
            "persistence",
            "malware",
            "unknown",
            "neue",
            "certificate",
            "error",
            "scans show",
            "record value",
            "title site",
            "servers",
            "emails",
            "all hostname",
            "dnsadmin",
            "data upload",
            "extraction",
            "failed",
            "include review",
            "exclude sugges",
            "find s",
            "typ no",
            "active",
            "urls",
            "ip address",
            "asn as54113",
            "registrar",
            "wscript",
            "united states",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "ogoogle trust",
            "cngts ca",
            "whitelisted",
            "as15169",
            "hostile",
            "crash",
            "contacted",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "detections alf",
            "hostile yara",
            "detections none",
            "less ip",
            "domains",
            "ms windows",
            "intel",
            "pe32",
            "regsetvalueexa",
            "langturkish",
            "sublangdefault",
            "port",
            "destination",
            "entries",
            "worm",
            "delphi",
            "win32",
            "body",
            "explorer",
            "defender",
            "regdword",
            "false",
            "true",
            "end sub",
            "object",
            "createobject",
            "sheetschanged",
            "private sub",
            "string",
            "boolean",
            "cancel",
            "trojan",
            "copy",
            "query",
            "dns update",
            "useragent",
            "myapp",
            "delphi alerts",
            "alerts deadhost",
            "women who code",
            "tulach",
            "114.114.114.114",
            "samuel",
            "brian sabey"
          ],
          "references": [
            "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
            "this.target",
            "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
            "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
            "authrootstl.cab common file extension",
            "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
            "https://securityaffairs.com/144927/cyber-crime~#",
            "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
            "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
            "https://clockoutbox.es/password",
            "http://cr-malware.testpanw.com/url",
            "IDS Detections: Query to a *.pw domain - Likely Hostile",
            "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
            "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
            "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
            "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
            "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
            "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
            "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
            "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
            "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
            "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
            "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
            "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
            "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
            "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
            "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
            "114.114.114.114 = Tulach"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ALF:Trojan:Win64/PsBanker",
              "display_name": "ALF:Trojan:Win64/PsBanker",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Trojan:O97M/Madeba.A!det",
              "display_name": "Trojan:O97M/Madeba.A!det",
              "target": "/malware/Trojan:O97M/Madeba.A!det"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1114,
            "hostname": 594,
            "domain": 200,
            "FileHash-SHA256": 2379,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 259,
            "IPv4": 322,
            "SSLCertFingerprint": 24,
            "email": 2,
            "IPv6": 1
          },
          "indicator_count": 5321,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "6 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6964c08bf79bcb252eaa9e15",
          "name": "TrojanSpy -  Spotify account under an attack which conceals artists releases / deletes followers",
          "description": "Spotify Attacks: TrojanSpy - Streamer Spotify account under an attack which conceals artists releases / deletes followers. The attack is adversarial. I\u2019m unclear how widespread it is.  . Further research required. OTX auto generated Pegasus. Released work that was once viewable is now concealed, followers deleted.\n#cloudfront #spyware #delete_service #cloudfront_attacks",
          "modified": "2026-02-11T09:03:20.933000",
          "created": "2026-01-12T09:36:11.701000",
          "tags": [
            "google",
            "fastly",
            "googlecl",
            "january",
            "http",
            "domain",
            "akamaias",
            "cloudflar",
            "page url",
            "de summary",
            "april",
            "reverse dns",
            "url https",
            "general full",
            "software",
            "united",
            "resource hash",
            "protocol h3",
            "security quic",
            "protocol h2",
            "security tls",
            "main",
            "present jan",
            "title",
            "gmt max",
            "certificate",
            "moved",
            "lowfi",
            "gmt content",
            "meta",
            "present dec",
            "status",
            "aaaa",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "win32",
            "files",
            "verdict",
            "files ip",
            "address",
            "mtb jan",
            "trojandropper",
            "backdoor",
            "win32upatre jan",
            "origin trial",
            "gmt cache",
            "443 ma2592000",
            "possible",
            "worm",
            "trojan",
            "ip address",
            "record value",
            "dark",
            "found",
            "ipv4 add",
            "error",
            "trojanspy",
            "emails",
            "servers",
            "pegasus",
            "america flag",
            "america asn",
            "tlsv1",
            "read c",
            "show",
            "medium",
            "lstockholm",
            "ospotify ab",
            "odigicert inc",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "dynamicloader",
            "yara rule",
            "ms windows",
            "pe32",
            "named pipe",
            "smartassembly",
            "delphi",
            "malware",
            "united states",
            "pe file",
            "filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "high",
            "write c",
            "tls sni",
            "tls handshake",
            "delete",
            "as15169",
            "stun binding",
            "request",
            "port",
            "win64",
            "themida",
            "guard",
            "risepro",
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "size",
            "mitre att",
            "ck id",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "ck techniques",
            "evasion att",
            "t1480 execution",
            "directui",
            "element",
            "hwndhost",
            "classinfobase",
            "hwndelement",
            "value",
            "explorer",
            "insert",
            "movie",
            "hacktool",
            "showing",
            "entries http",
            "scans show",
            "california",
            "location united",
            "next associated",
            "pulse pulses",
            "name servers",
            "found request",
            "unique",
            "url add",
            "related nids",
            "files location",
            "expiration",
            "flag united",
            "present nov",
            "present sep",
            "href",
            "suricata stream",
            "command decode",
            "starfield",
            "encrypt",
            "iframe",
            "date",
            "title error",
            "hostname",
            "pulse submit",
            "memcommit",
            "checks",
            "windows",
            "capture",
            "cloudfront",
            "colorado",
            "creation date",
            "hostname add",
            "eset",
            "binary file",
            "pdb path",
            "internalname",
            "nod32",
            "amon"
          ],
          "references": [
            "open.spotify.com \u2022",
            "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
            "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
            "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
            "https://target.tccwest.www.littleswimmers.fr/",
            "www.onyx-ware.com \u2022 endgamesystems.com",
            "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Packed.Stealerc-10017074-0",
              "display_name": "Win.Packed.Stealerc-10017074-0",
              "target": null
            },
            {
              "id": "#Lowfi:Win32/AutoIt",
              "display_name": "#Lowfi:Win32/AutoIt",
              "target": "/malware/#Lowfi:Win32/AutoIt"
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "TrojanSpy:MSIL/Yakbeex.A",
              "display_name": "TrojanSpy:MSIL/Yakbeex.A",
              "target": "/malware/TrojanSpy:MSIL/Yakbeex.A"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32:HacktoolX-gen\\ [Trj]",
              "display_name": "Win32:HacktoolX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "nUFS_unicode",
              "display_name": "nUFS_unicode",
              "target": null
            },
            {
              "id": "HackTool:Win32/CobaltStrike.A",
              "display_name": "HackTool:Win32/CobaltStrike.A",
              "target": "/malware/HackTool:Win32/CobaltStrike.A"
            },
            {
              "id": "Win.Dropper.PoisonIvy-9876745-0",
              "display_name": "Win.Dropper.PoisonIvy-9876745-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1293,
            "URL": 3389,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 531,
            "FileHash-SHA256": 2345,
            "domain": 501,
            "email": 12,
            "SSLCertFingerprint": 16
          },
          "indicator_count": 8722,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69642a749490c0bf404aa8ac",
          "name": "Google Services - Malware Packed Google Branded Services",
          "description": "Contacted Google services  | Service (1 of 3) || GoogleChromeElevationService | Mofksys \u2022 Unruy | Relationship: https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b | \n#affilliated #worm _#exploit #alternate_google #infection #spyware",
          "modified": "2026-02-10T22:01:54.041000",
          "created": "2026-01-11T22:55:48.308000",
          "tags": [
            "write c",
            "write",
            "delete c",
            "ms windows",
            "pe32 executable",
            "globalc",
            "united",
            "worm",
            "malware",
            "defender",
            "united states",
            "google",
            "google account",
            "mtb ids",
            "cloudflare dns",
            "https domain",
            "tls sni",
            "medium priority",
            "yara detections",
            "alerts",
            "google play",
            "google api",
            "google chrome",
            "mofksys",
            "exploit",
            "process32nextw",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "search",
            "precreate read",
            "read c",
            "dock",
            "unknown",
            "suspicious",
            "alt google",
            "execution att",
            "lowfi",
            "mtb jan",
            "trojandropper",
            "passive dns",
            "backdoor",
            "win32upatre jan",
            "origin trial",
            "gmt cache",
            "443 ma2592000",
            "possible",
            "trojan",
            "title",
            "mtb dec",
            "ipv4 add",
            "state",
            "trojan",
            "dropper",
            "phishing",
            "ransom",
            "of colorado"
          ],
          "references": [
            "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
            "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
            "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
            "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
            "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2",
            "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
            "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
            "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
            "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
            "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
            "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
            "Contacted Google services",
            "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
            "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "codewiki.google",
            "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
            "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
            "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
            "Alerts: injection_process_search protection_rx",
            "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
            "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
            "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
            "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
            "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
            "PE Version Information : TJprojMain.exe",
            "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
            "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Unruy-6912804-0",
              "display_name": "Win.Malware.Unruy-6912804-0",
              "target": null
            },
            {
              "id": "Win.Packed.Eyestye-9754938-0",
              "display_name": "Win.Packed.Eyestye-9754938-0",
              "target": null
            },
            {
              "id": "Eyestye",
              "display_name": "Eyestye",
              "target": null
            },
            {
              "id": "AutoRun",
              "display_name": "AutoRun",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Trojan:Win32/EyeStye.T",
              "display_name": "Trojan:Win32/EyeStye.T",
              "target": "/malware/Trojan:Win32/EyeStye.T"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/4Shared",
              "display_name": "ALF:HeraklezEval:PUA:Win32/4Shared",
              "target": null
            },
            {
              "id": "Cassini",
              "display_name": "Cassini",
              "target": null
            },
            {
              "id": "DarkMoon",
              "display_name": "DarkMoon",
              "target": null
            },
            {
              "id": "PolyRansom",
              "display_name": "PolyRansom",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Malware  Packed",
              "display_name": "Malware  Packed",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1078.003",
              "name": "Local Accounts",
              "display_name": "T1078.003 - Local Accounts"
            },
            {
              "id": "T1078.001",
              "name": "Default Accounts",
              "display_name": "T1078.001 - Default Accounts"
            },
            {
              "id": "T1087.003",
              "name": "Email Account",
              "display_name": "T1087.003 - Email Account"
            },
            {
              "id": "T1078.002",
              "name": "Domain Accounts",
              "display_name": "T1078.002 - Domain Accounts"
            },
            {
              "id": "T1090.004",
              "name": "Domain Fronting",
              "display_name": "T1090.004 - Domain Fronting"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 198,
            "FileHash-SHA1": 165,
            "FileHash-SHA256": 867,
            "URL": 1461,
            "hostname": 429,
            "domain": 221,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cd05cd3c9d0cc0b9ed215f",
          "name": "Emotet - https://www.gambinospizza.com | Brian Sabey \u2022 HallRender",
          "description": "\u2022Emotet botnets were observed dropping Trickbot to deliver ransomware payloads against some victims and Qakbot Trojans to steal banking credentials and data from other targets.\n\n\u2022Scammer 'Attorney' Brian Sabey | HallRender associated ; utilizes every form of social engineering to gain full access to phone numbers, email, banking,  network, relatives, contacts, PHI, PII, modifies services.\n.",
          "modified": "2024-04-15T08:03:32.381000",
          "created": "2024-02-14T18:26:21.427000",
          "tags": [
            "united",
            "unknown",
            "status",
            "sec ch",
            "as44273 host",
            "search",
            "aaaa",
            "showing",
            "ch ua",
            "record value",
            "ssl certificate",
            "threat roundup",
            "contacted",
            "communicating",
            "historical ssl",
            "referrer",
            "resolutions",
            "http",
            "execution",
            "gopher",
            "pattern match",
            "breakpoint",
            "command decode",
            "desktop",
            "base",
            "gambino",
            "pizza",
            "suricata ipv4",
            "mitre att",
            "date",
            "meta",
            "footer",
            "february",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "main",
            "brian sabey",
            "hallrender",
            "trojan",
            "worm",
            "frankfurt",
            "germany",
            "asn15169",
            "google",
            "asn16509",
            "amazon02",
            "asn396982",
            "kansas city",
            "franchise url",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "hash",
            "protocol h2",
            "asn13335",
            "cloudflarenet",
            "software",
            "domains",
            "hashes",
            "learn",
            "issues tab",
            "value",
            "variables",
            "typeof function",
            "topropertykey",
            "bricksintersect",
            "bricksfunction",
            "domainpath name",
            "request chain",
            "chain",
            "nl page",
            "url history",
            "javascript",
            "page url",
            "redirected",
            "poweshell",
            "bruschettab",
            "mobsterstageda",
            "calzonec",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "beefpizzac",
            "superitaliansub",
            "cname",
            "msie",
            "chrome",
            "asnone united",
            "as6336 turn",
            "nxdomain",
            "whitelisted",
            "creation date",
            "turn",
            "body",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "registrar abuse",
            "iana id",
            "registrar url",
            "registrar whois",
            "contact email",
            "registry domain",
            "contact phone",
            "dnssec",
            "code",
            "type name",
            "win32 exe",
            "recreation",
            "whois record",
            "infected",
            "page dow",
            "poser",
            "scammer",
            "security",
            "malvertizing",
            "betting",
            "illegal activity",
            "linux",
            "teen porn",
            "child exploitation",
            "script urls",
            "a domains",
            "as10796 charter",
            "find your",
            "next franchise",
            "x content",
            "backend",
            "as13768 aptum",
            "moved",
            "passive dns",
            "urls",
            "as2635",
            "as14061",
            "scan endpoints",
            "all octoseek",
            "url http",
            "pulse pulses",
            "ip address",
            "related nids",
            "files location",
            "date hash",
            "avast avg",
            "nastya",
            "entries",
            "emotet",
            "windows nt",
            "show",
            "etpro trojan",
            "channel",
            "artemis",
            "medium",
            "delete",
            "copy",
            "virustotal",
            "trojan",
            "write",
            "trojanproxy",
            "vipre",
            "panda",
            "malware",
            "malware infection",
            "dga",
            "algorithm generated domains",
            "command and control",
            "pe32 executable",
            "tag",
            "tagging",
            "porn tagging",
            "as3356 level",
            "tahoma arial",
            "servers",
            "as1136 kpn",
            "next",
            "et",
            "remote",
            "confirm http",
            "sectrack",
            "openssl",
            "fulldisc",
            "secunia",
            "confirm https",
            "openssl tls",
            "multiple",
            "remote",
            "misc https",
            "impact",
            "heartbleed",
            "external source",
            "name hyperlink",
            "hp hpsbmu02998",
            "hp hpsbmu03019",
            "hp hpsbmu03030",
            "hp hpsbmu03018",
            "title",
            "lowfi",
            "title error",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "mozilla",
            "720.282.2025",
            "masquerading",
            "ninite feb",
            "mtb feb",
            "telper",
            "trojandropper",
            "ninite",
            "create c",
            "read c",
            "default",
            "create",
            "unicode",
            "dock",
            "xport"
          ],
          "references": [
            "www.gambinospizza.com",
            "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
            "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
            "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
            "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
            "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
            "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
            "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
            "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
            "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
            "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
            "http://porn.toplistcreator.eu/in.php",
            "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
            "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10",
            "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
            "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
            "CVE-2014-0160 \u2022 CVE-2017-11882",
            "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
            "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "XLS:Nastya\\ [Trj]",
              "display_name": "XLS:Nastya\\ [Trj]",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Crypt4.YGM",
              "display_name": "Crypt4.YGM",
              "target": null
            },
            {
              "id": "ZBot",
              "display_name": "ZBot",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Heartbleed Bug",
              "display_name": "Heartbleed Bug",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 118,
            "FileHash-SHA1": 106,
            "domain": 3271,
            "hostname": 2451,
            "URL": 8652,
            "email": 8,
            "FileHash-SHA256": 3153,
            "CVE": 4
          },
          "indicator_count": 17763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "734 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
        "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
        "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
        "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
        "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
        "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden",
        "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
        "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
        "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
        "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
        "open.spotify.com \u2022",
        "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
        "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
        "114.114.114.114 = Tulach",
        "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
        "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
        "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
        "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
        "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
        "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
        "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
        "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
        "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
        "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://securityaffairs.com/144927/cyber-crime~#",
        "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
        "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
        "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
        "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
        "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net",
        "Alerts: injection_process_search protection_rx",
        "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
        "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
        "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
        "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
        "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
        "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
        "authrootstl.cab common file extension",
        "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
        "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
        "http://cr-malware.testpanw.com/url",
        "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
        "this.target",
        "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
        "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
        "https://clockoutbox.es/password",
        "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
        "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
        "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
        "CVE-2014-0160 \u2022 CVE-2017-11882",
        "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
        "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com",
        "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
        "Contacted Google services",
        "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
        "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
        "IDS Detections: Query to a *.pw domain - Likely Hostile",
        "www.onyx-ware.com \u2022 endgamesystems.com",
        "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
        "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
        "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
        "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
        "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
        "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
        "PE Version Information : TJprojMain.exe",
        "www.gambinospizza.com",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
        "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
        "codewiki.google",
        "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10",
        "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
        "http://porn.toplistcreator.eu/in.php",
        "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
        "https://target.tccwest.www.littleswimmers.fr/",
        "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
        "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
        "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
        "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
        "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
        "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Autorun",
            "Win.packed.stealerc-10017074-0",
            "Win32:hacktoolx-gen\\ [trj]",
            "Crypt4.ygm",
            "Eyestye",
            "Zbot",
            "Worm:win32/mofksys.rnd!mtb",
            "Alf:trojan:win64/psbanker",
            "Hacktool:win32/cobaltstrike.a",
            "Pegasus",
            "Win.packed.generic-9967832-0",
            "Trojan:win32/eyestye.t",
            "Trojan:win32/comspec",
            "Emotet",
            "Alf:heraklezeval:pua:win32/4shared",
            "Win.dropper.poisonivy-9876745-0",
            "Trojan:o97m/madeba.a!det",
            "Trojan:win32/zombie.a",
            "#lowfi:win32/autoit",
            "Cassini",
            "Upatre",
            "Tulach",
            "Trojanspy",
            "Nufs_unicode",
            "Trojanspy:msil/yakbeex.a",
            "Win.trojan.barys-10005825-0",
            "Xls:nastya\\ [trj]",
            "Darkmoon",
            "Win.packed.eyestye-9754938-0",
            "Heartbleed bug",
            "Win.malware.unruy-6912804-0",
            "Tofsee",
            "Worm:win32/autorun!atmn",
            "Polyransom",
            "Malware  packed",
            "Et"
          ],
          "industries": [
            "Technology",
            "Entertainment"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "69dc04c12782d2d76c111a93",
      "name": "VirusTotal \u2022 PsBanker \u2022 Attacked / Blocked",
      "description": "",
      "modified": "2026-04-12T20:46:57.338000",
      "created": "2026-04-12T20:46:57.338000",
      "tags": [
        "indicator role",
        "active related",
        "ck ids",
        "files",
        "information",
        "discovery",
        "mitre att",
        "pattern match",
        "ck id",
        "ck matrix",
        "ascii text",
        "united",
        "binary file",
        "april",
        "hybrid",
        "apikey",
        "general",
        "local",
        "path",
        "iframe",
        "click",
        "protocol",
        "learn",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "execution att",
        "related pulses",
        "dll read",
        "function read",
        "icmp traffic",
        "machineguid",
        "systembiosdate",
        "total",
        "read",
        "write",
        "network_icmp",
        "js_eval",
        "recon_fingerprint",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "tls handshake",
        "execution",
        "dock",
        "persistence",
        "malware",
        "unknown",
        "neue",
        "certificate",
        "error",
        "scans show",
        "record value",
        "title site",
        "servers",
        "emails",
        "all hostname",
        "dnsadmin",
        "data upload",
        "extraction",
        "failed",
        "include review",
        "exclude sugges",
        "find s",
        "typ no",
        "active",
        "urls",
        "ip address",
        "asn as54113",
        "registrar",
        "wscript",
        "united states",
        "stcalifornia",
        "lmountain view",
        "ogoogle llc",
        "ogoogle trust",
        "cngts ca",
        "whitelisted",
        "as15169",
        "hostile",
        "crash",
        "contacted",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "detections alf",
        "hostile yara",
        "detections none",
        "less ip",
        "domains",
        "ms windows",
        "intel",
        "pe32",
        "regsetvalueexa",
        "langturkish",
        "sublangdefault",
        "port",
        "destination",
        "entries",
        "worm",
        "delphi",
        "win32",
        "body",
        "explorer",
        "defender",
        "regdword",
        "false",
        "true",
        "end sub",
        "object",
        "createobject",
        "sheetschanged",
        "private sub",
        "string",
        "boolean",
        "cancel",
        "trojan",
        "copy",
        "query",
        "dns update",
        "useragent",
        "myapp",
        "delphi alerts",
        "alerts deadhost",
        "women who code",
        "tulach",
        "114.114.114.114",
        "samuel",
        "brian sabey"
      ],
      "references": [
        "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
        "this.target",
        "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
        "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
        "authrootstl.cab common file extension",
        "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
        "https://securityaffairs.com/144927/cyber-crime~#",
        "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
        "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
        "https://clockoutbox.es/password",
        "http://cr-malware.testpanw.com/url",
        "IDS Detections: Query to a *.pw domain - Likely Hostile",
        "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
        "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
        "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
        "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
        "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
        "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
        "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
        "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
        "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
        "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
        "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
        "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
        "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
        "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
        "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
        "114.114.114.114 = Tulach"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ALF:Trojan:Win64/PsBanker",
          "display_name": "ALF:Trojan:Win64/PsBanker",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Trojan:O97M/Madeba.A!det",
          "display_name": "Trojan:O97M/Madeba.A!det",
          "target": "/malware/Trojan:O97M/Madeba.A!det"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1114,
        "hostname": 594,
        "domain": 200,
        "FileHash-SHA256": 2379,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 259,
        "IPv4": 322,
        "SSLCertFingerprint": 24,
        "email": 2,
        "IPv6": 1
      },
      "indicator_count": 5321,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "6 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6964c08bf79bcb252eaa9e15",
      "name": "TrojanSpy -  Spotify account under an attack which conceals artists releases / deletes followers",
      "description": "Spotify Attacks: TrojanSpy - Streamer Spotify account under an attack which conceals artists releases / deletes followers. The attack is adversarial. I\u2019m unclear how widespread it is.  . Further research required. OTX auto generated Pegasus. Released work that was once viewable is now concealed, followers deleted.\n#cloudfront #spyware #delete_service #cloudfront_attacks",
      "modified": "2026-02-11T09:03:20.933000",
      "created": "2026-01-12T09:36:11.701000",
      "tags": [
        "google",
        "fastly",
        "googlecl",
        "january",
        "http",
        "domain",
        "akamaias",
        "cloudflar",
        "page url",
        "de summary",
        "april",
        "reverse dns",
        "url https",
        "general full",
        "software",
        "united",
        "resource hash",
        "protocol h3",
        "security quic",
        "protocol h2",
        "security tls",
        "main",
        "present jan",
        "title",
        "gmt max",
        "certificate",
        "moved",
        "lowfi",
        "gmt content",
        "meta",
        "present dec",
        "status",
        "aaaa",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "win32",
        "files",
        "verdict",
        "files ip",
        "address",
        "mtb jan",
        "trojandropper",
        "backdoor",
        "win32upatre jan",
        "origin trial",
        "gmt cache",
        "443 ma2592000",
        "possible",
        "worm",
        "trojan",
        "ip address",
        "record value",
        "dark",
        "found",
        "ipv4 add",
        "error",
        "trojanspy",
        "emails",
        "servers",
        "pegasus",
        "america flag",
        "america asn",
        "tlsv1",
        "read c",
        "show",
        "medium",
        "lstockholm",
        "ospotify ab",
        "odigicert inc",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "dynamicloader",
        "yara rule",
        "ms windows",
        "pe32",
        "named pipe",
        "smartassembly",
        "delphi",
        "malware",
        "united states",
        "pe file",
        "filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "high",
        "write c",
        "tls sni",
        "tls handshake",
        "delete",
        "as15169",
        "stun binding",
        "request",
        "port",
        "win64",
        "themida",
        "guard",
        "risepro",
        "sha256",
        "sha1",
        "pattern match",
        "ascii text",
        "size",
        "mitre att",
        "ck id",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "ck techniques",
        "evasion att",
        "t1480 execution",
        "directui",
        "element",
        "hwndhost",
        "classinfobase",
        "hwndelement",
        "value",
        "explorer",
        "insert",
        "movie",
        "hacktool",
        "showing",
        "entries http",
        "scans show",
        "california",
        "location united",
        "next associated",
        "pulse pulses",
        "name servers",
        "found request",
        "unique",
        "url add",
        "related nids",
        "files location",
        "expiration",
        "flag united",
        "present nov",
        "present sep",
        "href",
        "suricata stream",
        "command decode",
        "starfield",
        "encrypt",
        "iframe",
        "date",
        "title error",
        "hostname",
        "pulse submit",
        "memcommit",
        "checks",
        "windows",
        "capture",
        "cloudfront",
        "colorado",
        "creation date",
        "hostname add",
        "eset",
        "binary file",
        "pdb path",
        "internalname",
        "nod32",
        "amon"
      ],
      "references": [
        "open.spotify.com \u2022",
        "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
        "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
        "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
        "https://target.tccwest.www.littleswimmers.fr/",
        "www.onyx-ware.com \u2022 endgamesystems.com",
        "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Win.Packed.Stealerc-10017074-0",
          "display_name": "Win.Packed.Stealerc-10017074-0",
          "target": null
        },
        {
          "id": "#Lowfi:Win32/AutoIt",
          "display_name": "#Lowfi:Win32/AutoIt",
          "target": "/malware/#Lowfi:Win32/AutoIt"
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "TrojanSpy:MSIL/Yakbeex.A",
          "display_name": "TrojanSpy:MSIL/Yakbeex.A",
          "target": "/malware/TrojanSpy:MSIL/Yakbeex.A"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32:HacktoolX-gen\\ [Trj]",
          "display_name": "Win32:HacktoolX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "nUFS_unicode",
          "display_name": "nUFS_unicode",
          "target": null
        },
        {
          "id": "HackTool:Win32/CobaltStrike.A",
          "display_name": "HackTool:Win32/CobaltStrike.A",
          "target": "/malware/HackTool:Win32/CobaltStrike.A"
        },
        {
          "id": "Win.Dropper.PoisonIvy-9876745-0",
          "display_name": "Win.Dropper.PoisonIvy-9876745-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1293,
        "URL": 3389,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 531,
        "FileHash-SHA256": 2345,
        "domain": 501,
        "email": 12,
        "SSLCertFingerprint": 16
      },
      "indicator_count": 8722,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69642a749490c0bf404aa8ac",
      "name": "Google Services - Malware Packed Google Branded Services",
      "description": "Contacted Google services  | Service (1 of 3) || GoogleChromeElevationService | Mofksys \u2022 Unruy | Relationship: https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b | \n#affilliated #worm _#exploit #alternate_google #infection #spyware",
      "modified": "2026-02-10T22:01:54.041000",
      "created": "2026-01-11T22:55:48.308000",
      "tags": [
        "write c",
        "write",
        "delete c",
        "ms windows",
        "pe32 executable",
        "globalc",
        "united",
        "worm",
        "malware",
        "defender",
        "united states",
        "google",
        "google account",
        "mtb ids",
        "cloudflare dns",
        "https domain",
        "tls sni",
        "medium priority",
        "yara detections",
        "alerts",
        "google play",
        "google api",
        "google chrome",
        "mofksys",
        "exploit",
        "process32nextw",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "search",
        "precreate read",
        "read c",
        "dock",
        "unknown",
        "suspicious",
        "alt google",
        "execution att",
        "lowfi",
        "mtb jan",
        "trojandropper",
        "passive dns",
        "backdoor",
        "win32upatre jan",
        "origin trial",
        "gmt cache",
        "443 ma2592000",
        "possible",
        "trojan",
        "title",
        "mtb dec",
        "ipv4 add",
        "state",
        "trojan",
        "dropper",
        "phishing",
        "ransom",
        "of colorado"
      ],
      "references": [
        "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
        "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
        "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
        "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
        "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2",
        "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
        "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
        "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
        "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
        "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
        "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
        "Contacted Google services",
        "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
        "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "codewiki.google",
        "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
        "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
        "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
        "Alerts: injection_process_search protection_rx",
        "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
        "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
        "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
        "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
        "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
        "PE Version Information : TJprojMain.exe",
        "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
        "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Unruy-6912804-0",
          "display_name": "Win.Malware.Unruy-6912804-0",
          "target": null
        },
        {
          "id": "Win.Packed.Eyestye-9754938-0",
          "display_name": "Win.Packed.Eyestye-9754938-0",
          "target": null
        },
        {
          "id": "Eyestye",
          "display_name": "Eyestye",
          "target": null
        },
        {
          "id": "AutoRun",
          "display_name": "AutoRun",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Trojan:Win32/EyeStye.T",
          "display_name": "Trojan:Win32/EyeStye.T",
          "target": "/malware/Trojan:Win32/EyeStye.T"
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/4Shared",
          "display_name": "ALF:HeraklezEval:PUA:Win32/4Shared",
          "target": null
        },
        {
          "id": "Cassini",
          "display_name": "Cassini",
          "target": null
        },
        {
          "id": "DarkMoon",
          "display_name": "DarkMoon",
          "target": null
        },
        {
          "id": "PolyRansom",
          "display_name": "PolyRansom",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Malware  Packed",
          "display_name": "Malware  Packed",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1078.003",
          "name": "Local Accounts",
          "display_name": "T1078.003 - Local Accounts"
        },
        {
          "id": "T1078.001",
          "name": "Default Accounts",
          "display_name": "T1078.001 - Default Accounts"
        },
        {
          "id": "T1087.003",
          "name": "Email Account",
          "display_name": "T1087.003 - Email Account"
        },
        {
          "id": "T1078.002",
          "name": "Domain Accounts",
          "display_name": "T1078.002 - Domain Accounts"
        },
        {
          "id": "T1090.004",
          "name": "Domain Fronting",
          "display_name": "T1090.004 - Domain Fronting"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 198,
        "FileHash-SHA1": 165,
        "FileHash-SHA256": 867,
        "URL": 1461,
        "hostname": 429,
        "domain": 221,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 3342,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cd05cd3c9d0cc0b9ed215f",
      "name": "Emotet - https://www.gambinospizza.com | Brian Sabey \u2022 HallRender",
      "description": "\u2022Emotet botnets were observed dropping Trickbot to deliver ransomware payloads against some victims and Qakbot Trojans to steal banking credentials and data from other targets.\n\n\u2022Scammer 'Attorney' Brian Sabey | HallRender associated ; utilizes every form of social engineering to gain full access to phone numbers, email, banking,  network, relatives, contacts, PHI, PII, modifies services.\n.",
      "modified": "2024-04-15T08:03:32.381000",
      "created": "2024-02-14T18:26:21.427000",
      "tags": [
        "united",
        "unknown",
        "status",
        "sec ch",
        "as44273 host",
        "search",
        "aaaa",
        "showing",
        "ch ua",
        "record value",
        "ssl certificate",
        "threat roundup",
        "contacted",
        "communicating",
        "historical ssl",
        "referrer",
        "resolutions",
        "http",
        "execution",
        "gopher",
        "pattern match",
        "breakpoint",
        "command decode",
        "desktop",
        "base",
        "gambino",
        "pizza",
        "suricata ipv4",
        "mitre att",
        "date",
        "meta",
        "footer",
        "february",
        "general",
        "model",
        "comspec",
        "click",
        "strings",
        "main",
        "brian sabey",
        "hallrender",
        "trojan",
        "worm",
        "frankfurt",
        "germany",
        "asn15169",
        "google",
        "asn16509",
        "amazon02",
        "asn396982",
        "kansas city",
        "franchise url",
        "gmbh version",
        "status page",
        "service privacy",
        "legal",
        "impressum",
        "reverse dns",
        "general full",
        "url https",
        "resource",
        "hash",
        "protocol h2",
        "asn13335",
        "cloudflarenet",
        "software",
        "domains",
        "hashes",
        "learn",
        "issues tab",
        "value",
        "variables",
        "typeof function",
        "topropertykey",
        "bricksintersect",
        "bricksfunction",
        "domainpath name",
        "request chain",
        "chain",
        "nl page",
        "url history",
        "javascript",
        "page url",
        "redirected",
        "poweshell",
        "bruschettab",
        "mobsterstageda",
        "calzonec",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "beefpizzac",
        "superitaliansub",
        "cname",
        "msie",
        "chrome",
        "asnone united",
        "as6336 turn",
        "nxdomain",
        "whitelisted",
        "creation date",
        "turn",
        "body",
        "algorithm",
        "v3 serial",
        "number",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "x509v3 extended",
        "info",
        "first",
        "server",
        "registrar abuse",
        "iana id",
        "registrar url",
        "registrar whois",
        "contact email",
        "registry domain",
        "contact phone",
        "dnssec",
        "code",
        "type name",
        "win32 exe",
        "recreation",
        "whois record",
        "infected",
        "page dow",
        "poser",
        "scammer",
        "security",
        "malvertizing",
        "betting",
        "illegal activity",
        "linux",
        "teen porn",
        "child exploitation",
        "script urls",
        "a domains",
        "as10796 charter",
        "find your",
        "next franchise",
        "x content",
        "backend",
        "as13768 aptum",
        "moved",
        "passive dns",
        "urls",
        "as2635",
        "as14061",
        "scan endpoints",
        "all octoseek",
        "url http",
        "pulse pulses",
        "ip address",
        "related nids",
        "files location",
        "date hash",
        "avast avg",
        "nastya",
        "entries",
        "emotet",
        "windows nt",
        "show",
        "etpro trojan",
        "channel",
        "artemis",
        "medium",
        "delete",
        "copy",
        "virustotal",
        "trojan",
        "write",
        "trojanproxy",
        "vipre",
        "panda",
        "malware",
        "malware infection",
        "dga",
        "algorithm generated domains",
        "command and control",
        "pe32 executable",
        "tag",
        "tagging",
        "porn tagging",
        "as3356 level",
        "tahoma arial",
        "servers",
        "as1136 kpn",
        "next",
        "et",
        "remote",
        "confirm http",
        "sectrack",
        "openssl",
        "fulldisc",
        "secunia",
        "confirm https",
        "openssl tls",
        "multiple",
        "remote",
        "misc https",
        "impact",
        "heartbleed",
        "external source",
        "name hyperlink",
        "hp hpsbmu02998",
        "hp hpsbmu03019",
        "hp hpsbmu03030",
        "hp hpsbmu03018",
        "title",
        "lowfi",
        "title error",
        "body doctype",
        "html public",
        "w3cdtd html",
        "html head",
        "mozilla",
        "720.282.2025",
        "masquerading",
        "ninite feb",
        "mtb feb",
        "telper",
        "trojandropper",
        "ninite",
        "create c",
        "read c",
        "default",
        "create",
        "unicode",
        "dock",
        "xport"
      ],
      "references": [
        "www.gambinospizza.com",
        "0qMrDxlbqY9THmtdz56XQ2fTe-p9H49lftTmBXmn1WY9Z16q1vJdZdjO5Wnq_Pn3gEAAP__hu8yPQ",
        "https://apps.apple.com/us/app/gambinos-pizza/id1500338496 \u2022 apps.apple.com",
        "https://play.google.com/store/apps/details?id=com.e9117073d4e0.www",
        "targeting.unrulymedia.com \u2022 http://theteenhealthdoc.com",
        "https://www.hallrender.com/attorney/brian-sabey/ \u2022 www.hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg \u2022 https://www.hallrender.com/xmlrpc.php?rsd",
        "https://teenlist.toplistcreator.eu/in.php?nr=15170//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu//www.toplistcreator.eu",
        "http://fboomporn.com/teens/51826-gloryholeswallow-flora-floras-1st-gloryhole-visit-fullhd-1080p.html \u2022 teenystar18.toplistcreator.eu",
        "theteenhealthdoc.com \u2022 http://jailbait.toplistcreator.eu/link.php?link=teenystar18.toplistcreator.eu&nr=522 \u2022 franchisefifteen.com",
        "https://fboomporn.com/engine/opensearch.php \u2022 http://porn.hub-accessories.site/ \u2022 https://pic.porn.hub-accessories.site",
        "http://porn.toplistcreator.eu/in.php",
        "ETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t85.17.142.7\t\t\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.\t\t 2807561\tETPRO TROJAN Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.103\t95.169.186.63",
        "Trojan/Win32.Zbot Covert Channel 2 port 53\t192.168.56.10",
        "https://tag.1rx.io/rmp/215626/0/mvo?z=1r&hbv=8.16,2.1\ttag.1rx.io \u2022 192.208.222.110",
        "http://email.acm.mg.hydrantid.com/c/eJxUyTGygyAQBuDTQMksPyhYULzGe-C6LzCKOoYmt88kXdrvWxPlEJ3TkmygcbQBHrokFk-R4WwexpBl-J8Ce8uygBdeJqtrAsGTdWQB8jA0yQDEL0qMrD",
        "CVE-2014-0160 \u2022 CVE-2017-11882",
        "a17-250-248-150.www.bing.com \u2022 appledirectory.www.bing.com",
        "animate-citadel-t3gbc9x3gzd7invrzh8w00zm.herokudns.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Comspec",
          "display_name": "Trojan:Win32/Comspec",
          "target": "/malware/Trojan:Win32/Comspec"
        },
        {
          "id": "XLS:Nastya\\ [Trj]",
          "display_name": "XLS:Nastya\\ [Trj]",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Crypt4.YGM",
          "display_name": "Crypt4.YGM",
          "target": null
        },
        {
          "id": "ZBot",
          "display_name": "ZBot",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Heartbleed Bug",
          "display_name": "Heartbleed Bug",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 59,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 118,
        "FileHash-SHA1": 106,
        "domain": 3271,
        "hostname": 2451,
        "URL": 8652,
        "email": 8,
        "FileHash-SHA256": 3153,
        "CVE": 4
      },
      "indicator_count": 17763,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "734 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "projectzero.google",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "projectzero.google",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776627988.0116532
}