{
  "type": "Domain",
  "indicator": "puppet.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/puppet.com",
    "alexa": "http://www.alexa.com/siteinfo/puppet.com",
    "indicator": "puppet.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [
      {
        "source": "majestic",
        "message": "Whitelisted domain puppet.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 753098197,
      "indicator": "puppet.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "67c6bb5aa601e91b1314ff44",
          "name": "SCANID: S-KhOoOrXsco8: Thor Lite Linux 64 - Sample Lab Device 2 - incomplete (not enriched)",
          "description": "Thor Lite Linux 64 - Sample Lab Device 2 - incomplete\nhttps://tip.neiki.dev/file/09de67f8d3ce9a276e9665dc2e0013577b38d60b0518ffe7961bdc7f8755a52d\nSCANID: S-KhOoOrXsco8",
          "modified": "2025-04-22T06:02:28.535000",
          "created": "2025-03-04T08:35:38.390000",
          "tags": [
            "misc",
            "filename ioc",
            "scanid",
            "sigtype1",
            "reasonscount",
            "sg2backup drive",
            "thu feb",
            "log entry",
            "exists1",
            "matched1",
            "warp",
            "trash",
            "rooter",
            "service",
            "puppet",
            "apache",
            "ruby",
            "execution",
            "android",
            "glasses",
            "agent",
            "hermes",
            "atlas",
            "score",
            "open",
            "orion",
            "entity",
            "download",
            "enterprise",
            "nexus",
            "beyond",
            "patch",
            "rest",
            "bsod",
            "bind",
            "june",
            "upgrade",
            "project",
            "surtr",
            "path",
            "mandrake",
            "accept",
            "openssl",
            "null",
            "responder",
            "shell",
            "servu",
            "cargo",
            "bypass",
            "green",
            "python",
            "iframe",
            "webex",
            "blink",
            "code",
            "netty",
            "fall",
            "grab",
            "metasploit",
            "webdav",
            "postscript",
            "middle",
            "assistant",
            "energy",
            "august",
            "diego",
            "february",
            "hold",
            "write",
            "extras",
            "fusion",
            "trace",
            "click",
            "rust",
            "anna",
            "virustotal",
            "rootkit",
            "timestomp",
            "doublepulsar",
            "logger",
            "teamviewer",
            "obfus",
            "probe",
            "win32",
            "snoopy",
            "vuln",
            "april",
            "format",
            "flash",
            "domino",
            "calendar",
            "cryptocat",
            "orca",
            "hello",
            "stream",
            "confi",
            "sharepoint",
            "launcher",
            "hypervisor",
            "malicious",
            "lame",
            "attack",
            "prior",
            "simple",
            "hpack",
            "homepage",
            "easy",
            "live",
            "cookie",
            "explorer",
            "config",
            "rush",
            "spark",
            "chat",
            "media",
            "webview",
            "trigger",
            "northstar",
            "monitoring",
            "false",
            "impact",
            "dino",
            "example",
            "splash",
            "macos",
            "notifier",
            "error",
            "spring",
            "this",
            "neutrino",
            "tools",
            "template",
            "crow",
            "magento",
            "zimbra",
            "drop",
            "stack",
            "linear",
            "blocker",
            "deleter",
            "main",
            "face",
            "arch",
            "hosts",
            "bifrost",
            "recursive",
            "cobaltstrike",
            "luckycat",
            "brain",
            "apt",
            "php",
            "rat",
            "hacktool",
            "worm",
            "meterpreter",
            "obfuscated",
            "evasive",
            "exaramel",
            "anti-vm"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/iocs",
            "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/summary",
            "https://www.virustotal.com/graph/embed/ga8f86f452d6d4819b2dedf4c1981843304472a457d9b4b339f35679f4693ce9c?theme=dark",
            "https://tip.neiki.dev/file/09de67f8d3ce9a276e9665dc2e0013577b38d60b0518ffe7961bdc7f8755a52d",
            "https://cyber-fortress.com/docs/result/index.php?id=67c6bb9cc8d04e92a4bed8fc",
            "https://www.filescan.io/uploads/67c6bd19e95d0f9029e3804f/reports/834b740f-9bcb-42d9-b6a1-a0a8dbd07b07/overview",
            "https://www.filescan.io/uploads/67df8585fae452b82c2115b7/reports/65f03ad1-b5bc-41a8-ae82-21970a18efcb/ioc",
            "https://hybrid-analysis.com/sample/a6b9deae18604003aa3963d5d83775f5c66bfbe93ea4608fe8a69e6af3722f45/67df874be4fc8d105e0230d1"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            }
          ],
          "industries": [
            "Education",
            "Healthcare",
            "Government",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 14071,
            "FileHash-MD5": 979,
            "FileHash-SHA1": 2568,
            "FileHash-SHA256": 636,
            "URL": 43905,
            "domain": 2031,
            "email": 31,
            "hostname": 3621
          },
          "indicator_count": 67842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 132,
          "modified_text": "362 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67eb87f8beff23dfe3508000",
          "name": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device",
          "description": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device (She's had it)\nResults for matches uploaded to VT\nJust tossed results into this pulse so - sloppy.",
          "modified": "2025-04-01T07:52:30.117000",
          "created": "2025-04-01T06:30:16.309000",
          "tags": [
            "fri mar",
            "filename ioc",
            "reasonscount",
            "sigtype1",
            "indicator type",
            "log entry",
            "entry",
            "exists1",
            "matched1",
            "exploit code",
            "score",
            "rooter",
            "warp",
            "cobaltstrike",
            "luckycat",
            "obfus",
            "code",
            "surtr",
            "9999",
            "powersploit",
            "bypass",
            "proftpd",
            "mimikatz",
            "info"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs",
            "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            }
          ],
          "industries": [
            "Technology",
            "Healthcare",
            "Education",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 345,
            "FileHash-MD5": 111,
            "FileHash-SHA1": 174,
            "FileHash-SHA256": 131,
            "URL": 499,
            "domain": 38,
            "hostname": 47
          },
          "indicator_count": 1345,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "383 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67a219f7c06d372f86335d64",
          "name": "Thor Linux Lite Scan - Sample Device & SG2 - 02.07.25 - Unenriched",
          "description": "Took a few tries but here is the complete thor Linux 64 Lite Scan on: Sample Device & a single drive (one of many) of the 77 TB of: things I have but don't know what to do with\n---\nOld Notes on previous scan attempts for this sample.\nSee Comments on VT\nMD5\nde880994c51d4055c960e2d32db89774\n \nSHA-1\n539e7c2eefd7a6aa17db436d83738c117f26798c\n \nSHA-256\na6b9deae18604003aa3963d5d83775f5c66bfbe93ea4608fe8a69e6af3722f45\n \nSSDEEP\n98304:hpUsCWtdIdOKfb44V0ipGuEwWPKhmMWMCURFfxzRq6R5qJJfrPOOD86U6BDfIokW:BKftFfuDfqAfPPfa4f3\n \nTLSH\nT10D571AC3C70811188D2373EBE1B4BA59BD06381EDECA9D59F08D642C97946467A2EDCF",
          "modified": "2025-03-09T16:04:43.604000",
          "created": "2025-02-04T13:45:27.169000",
          "tags": [
            "stuff",
            "data",
            "no problems",
            "upload",
            "problems1",
            "progressb",
            "progressi",
            "onedrive",
            "files",
            "bitdefender",
            "scanid",
            "lite version",
            "ioc jan",
            "thor lite",
            "ip address",
            "writing",
            "cron",
            "envcheck",
            "filescan",
            "firewall",
            "rootkit",
            "timestomp",
            "doublepulsar",
            "logger",
            "teamviewer",
            "virustotal",
            "arch",
            "hosts"
          ],
          "references": [
            "pop-os_files_md5s.csv",
            "https://www.virustotal.com/graph/embed/g532ea94109c54d96ba1bde62201fb4439ef00ab8d0af4a2f99ee42846ad158df?theme=dark",
            "SCANID: S-yIBIO4Ib0l4",
            "SCANID: S-9uT7vEdHwHk",
            "SCANID: S-4FSYbAVw6TA",
            "SCANID: S-4jjwyMrjTU0",
            "SCANID: S-jZUP9vdJp8E",
            "https://www.virustotal.com/gui/collection/d8bbd97abe2ea808a02db46380171df0803a43a379ed3795a316cb1f947939de/iocs",
            "SCANID: S-CadvV0Kd35c",
            "SCANID: S-0LxiGnOve0Q",
            "SCANID: S-YV38dG9guZE",
            "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/iocs",
            "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/summary"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Education",
            "Healthcare",
            "Government",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 701,
            "FileHash-SHA1": 871,
            "FileHash-SHA256": 897,
            "URL": 2920,
            "domain": 388,
            "email": 17,
            "CVE": 830,
            "hostname": 295
          },
          "indicator_count": 6919,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "SCANID: S-4jjwyMrjTU0",
        "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/summary",
        "https://www.filescan.io/uploads/67df8585fae452b82c2115b7/reports/65f03ad1-b5bc-41a8-ae82-21970a18efcb/ioc",
        "SCANID: S-YV38dG9guZE",
        "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/summary",
        "https://www.virustotal.com/graph/embed/g532ea94109c54d96ba1bde62201fb4439ef00ab8d0af4a2f99ee42846ad158df?theme=dark",
        "SCANID: S-CadvV0Kd35c",
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary",
        "SCANID: S-4FSYbAVw6TA",
        "https://www.virustotal.com/graph/embed/ga8f86f452d6d4819b2dedf4c1981843304472a457d9b4b339f35679f4693ce9c?theme=dark",
        "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/iocs",
        "https://tip.neiki.dev/file/09de67f8d3ce9a276e9665dc2e0013577b38d60b0518ffe7961bdc7f8755a52d",
        "pop-os_files_md5s.csv",
        "SCANID: S-yIBIO4Ib0l4",
        "https://hybrid-analysis.com/sample/a6b9deae18604003aa3963d5d83775f5c66bfbe93ea4608fe8a69e6af3722f45/67df874be4fc8d105e0230d1",
        "SCANID: S-0LxiGnOve0Q",
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs",
        "https://www.filescan.io/uploads/67c6bd19e95d0f9029e3804f/reports/834b740f-9bcb-42d9-b6a1-a0a8dbd07b07/overview",
        "https://www.virustotal.com/gui/collection/d8bbd97abe2ea808a02db46380171df0803a43a379ed3795a316cb1f947939de/iocs",
        "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/iocs",
        "https://cyber-fortress.com/docs/result/index.php?id=67c6bb9cc8d04e92a4bed8fc",
        "SCANID: S-jZUP9vdJp8E",
        "SCANID: S-9uT7vEdHwHk"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [
            "Healthcare",
            "Telecommunications",
            "Education",
            "Government",
            "Technology"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "67c6bb5aa601e91b1314ff44",
      "name": "SCANID: S-KhOoOrXsco8: Thor Lite Linux 64 - Sample Lab Device 2 - incomplete (not enriched)",
      "description": "Thor Lite Linux 64 - Sample Lab Device 2 - incomplete\nhttps://tip.neiki.dev/file/09de67f8d3ce9a276e9665dc2e0013577b38d60b0518ffe7961bdc7f8755a52d\nSCANID: S-KhOoOrXsco8",
      "modified": "2025-04-22T06:02:28.535000",
      "created": "2025-03-04T08:35:38.390000",
      "tags": [
        "misc",
        "filename ioc",
        "scanid",
        "sigtype1",
        "reasonscount",
        "sg2backup drive",
        "thu feb",
        "log entry",
        "exists1",
        "matched1",
        "warp",
        "trash",
        "rooter",
        "service",
        "puppet",
        "apache",
        "ruby",
        "execution",
        "android",
        "glasses",
        "agent",
        "hermes",
        "atlas",
        "score",
        "open",
        "orion",
        "entity",
        "download",
        "enterprise",
        "nexus",
        "beyond",
        "patch",
        "rest",
        "bsod",
        "bind",
        "june",
        "upgrade",
        "project",
        "surtr",
        "path",
        "mandrake",
        "accept",
        "openssl",
        "null",
        "responder",
        "shell",
        "servu",
        "cargo",
        "bypass",
        "green",
        "python",
        "iframe",
        "webex",
        "blink",
        "code",
        "netty",
        "fall",
        "grab",
        "metasploit",
        "webdav",
        "postscript",
        "middle",
        "assistant",
        "energy",
        "august",
        "diego",
        "february",
        "hold",
        "write",
        "extras",
        "fusion",
        "trace",
        "click",
        "rust",
        "anna",
        "virustotal",
        "rootkit",
        "timestomp",
        "doublepulsar",
        "logger",
        "teamviewer",
        "obfus",
        "probe",
        "win32",
        "snoopy",
        "vuln",
        "april",
        "format",
        "flash",
        "domino",
        "calendar",
        "cryptocat",
        "orca",
        "hello",
        "stream",
        "confi",
        "sharepoint",
        "launcher",
        "hypervisor",
        "malicious",
        "lame",
        "attack",
        "prior",
        "simple",
        "hpack",
        "homepage",
        "easy",
        "live",
        "cookie",
        "explorer",
        "config",
        "rush",
        "spark",
        "chat",
        "media",
        "webview",
        "trigger",
        "northstar",
        "monitoring",
        "false",
        "impact",
        "dino",
        "example",
        "splash",
        "macos",
        "notifier",
        "error",
        "spring",
        "this",
        "neutrino",
        "tools",
        "template",
        "crow",
        "magento",
        "zimbra",
        "drop",
        "stack",
        "linear",
        "blocker",
        "deleter",
        "main",
        "face",
        "arch",
        "hosts",
        "bifrost",
        "recursive",
        "cobaltstrike",
        "luckycat",
        "brain",
        "apt",
        "php",
        "rat",
        "hacktool",
        "worm",
        "meterpreter",
        "obfuscated",
        "evasive",
        "exaramel",
        "anti-vm"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/iocs",
        "https://www.virustotal.com/gui/collection/9c02b7b214c51b2fa7b6f2f38943a83ada3fff5ab9cbb9cf52e320bd702c9cd0/summary",
        "https://www.virustotal.com/graph/embed/ga8f86f452d6d4819b2dedf4c1981843304472a457d9b4b339f35679f4693ce9c?theme=dark",
        "https://tip.neiki.dev/file/09de67f8d3ce9a276e9665dc2e0013577b38d60b0518ffe7961bdc7f8755a52d",
        "https://cyber-fortress.com/docs/result/index.php?id=67c6bb9cc8d04e92a4bed8fc",
        "https://www.filescan.io/uploads/67c6bd19e95d0f9029e3804f/reports/834b740f-9bcb-42d9-b6a1-a0a8dbd07b07/overview",
        "https://www.filescan.io/uploads/67df8585fae452b82c2115b7/reports/65f03ad1-b5bc-41a8-ae82-21970a18efcb/ioc",
        "https://hybrid-analysis.com/sample/a6b9deae18604003aa3963d5d83775f5c66bfbe93ea4608fe8a69e6af3722f45/67df874be4fc8d105e0230d1"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        }
      ],
      "industries": [
        "Education",
        "Healthcare",
        "Government",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 45,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 14071,
        "FileHash-MD5": 979,
        "FileHash-SHA1": 2568,
        "FileHash-SHA256": 636,
        "URL": 43905,
        "domain": 2031,
        "email": 31,
        "hostname": 3621
      },
      "indicator_count": 67842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 132,
      "modified_text": "362 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67eb87f8beff23dfe3508000",
      "name": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device",
      "description": "Thor Lite Linux 64 - 03.31.25 - Sample PopOS Device (She's had it)\nResults for matches uploaded to VT\nJust tossed results into this pulse so - sloppy.",
      "modified": "2025-04-01T07:52:30.117000",
      "created": "2025-04-01T06:30:16.309000",
      "tags": [
        "fri mar",
        "filename ioc",
        "reasonscount",
        "sigtype1",
        "indicator type",
        "log entry",
        "entry",
        "exists1",
        "matched1",
        "exploit code",
        "score",
        "rooter",
        "warp",
        "cobaltstrike",
        "luckycat",
        "obfus",
        "code",
        "surtr",
        "9999",
        "powersploit",
        "bypass",
        "proftpd",
        "mimikatz",
        "info"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/iocs",
        "https://www.virustotal.com/gui/collection/febf534513e07ef3b2a63b824827cc86b61c21d641bbb9da73933240dd9d2710/summary"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1569",
          "name": "System Services",
          "display_name": "T1569 - System Services"
        }
      ],
      "industries": [
        "Technology",
        "Healthcare",
        "Education",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 345,
        "FileHash-MD5": 111,
        "FileHash-SHA1": 174,
        "FileHash-SHA256": 131,
        "URL": 499,
        "domain": 38,
        "hostname": 47
      },
      "indicator_count": 1345,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "383 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67a219f7c06d372f86335d64",
      "name": "Thor Linux Lite Scan - Sample Device & SG2 - 02.07.25 - Unenriched",
      "description": "Took a few tries but here is the complete thor Linux 64 Lite Scan on: Sample Device & a single drive (one of many) of the 77 TB of: things I have but don't know what to do with\n---\nOld Notes on previous scan attempts for this sample.\nSee Comments on VT\nMD5\nde880994c51d4055c960e2d32db89774\n \nSHA-1\n539e7c2eefd7a6aa17db436d83738c117f26798c\n \nSHA-256\na6b9deae18604003aa3963d5d83775f5c66bfbe93ea4608fe8a69e6af3722f45\n \nSSDEEP\n98304:hpUsCWtdIdOKfb44V0ipGuEwWPKhmMWMCURFfxzRq6R5qJJfrPOOD86U6BDfIokW:BKftFfuDfqAfPPfa4f3\n \nTLSH\nT10D571AC3C70811188D2373EBE1B4BA59BD06381EDECA9D59F08D642C97946467A2EDCF",
      "modified": "2025-03-09T16:04:43.604000",
      "created": "2025-02-04T13:45:27.169000",
      "tags": [
        "stuff",
        "data",
        "no problems",
        "upload",
        "problems1",
        "progressb",
        "progressi",
        "onedrive",
        "files",
        "bitdefender",
        "scanid",
        "lite version",
        "ioc jan",
        "thor lite",
        "ip address",
        "writing",
        "cron",
        "envcheck",
        "filescan",
        "firewall",
        "rootkit",
        "timestomp",
        "doublepulsar",
        "logger",
        "teamviewer",
        "virustotal",
        "arch",
        "hosts"
      ],
      "references": [
        "pop-os_files_md5s.csv",
        "https://www.virustotal.com/graph/embed/g532ea94109c54d96ba1bde62201fb4439ef00ab8d0af4a2f99ee42846ad158df?theme=dark",
        "SCANID: S-yIBIO4Ib0l4",
        "SCANID: S-9uT7vEdHwHk",
        "SCANID: S-4FSYbAVw6TA",
        "SCANID: S-4jjwyMrjTU0",
        "SCANID: S-jZUP9vdJp8E",
        "https://www.virustotal.com/gui/collection/d8bbd97abe2ea808a02db46380171df0803a43a379ed3795a316cb1f947939de/iocs",
        "SCANID: S-CadvV0Kd35c",
        "SCANID: S-0LxiGnOve0Q",
        "SCANID: S-YV38dG9guZE",
        "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/iocs",
        "https://www.virustotal.com/gui/collection/f890b10e639770c7e6ef3eeb804ee9e7391360557aedca7b1daaee02da0f7682/summary"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Education",
        "Healthcare",
        "Government",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 701,
        "FileHash-SHA1": 871,
        "FileHash-SHA256": 897,
        "URL": 2920,
        "domain": 388,
        "email": 17,
        "CVE": 830,
        "hostname": 295
      },
      "indicator_count": 6919,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "406 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "puppet.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "puppet.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622596.9769762
}