{
  "type": "Domain",
  "indicator": "pythonware.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/pythonware.com",
    "alexa": "http://www.alexa.com/siteinfo/pythonware.com",
    "indicator": "pythonware.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [
      {
        "source": "majestic",
        "message": "Whitelisted domain pythonware.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2781653347,
      "indicator": "pythonware.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "69b95579bdc4ac1824b7ee95",
          "name": "VirusTotal report\n                    for program.exe",
          "description": "",
          "modified": "2026-04-16T13:37:13.951000",
          "created": "2026-03-17T13:22:01.672000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 101,
            "FileHash-SHA256": 114,
            "URL": 106,
            "domain": 23,
            "hostname": 66
          },
          "indicator_count": 511,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "3 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6905d40f781d7d58d4021a20",
          "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
          "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
          "modified": "2025-12-20T06:00:23.758000",
          "created": "2025-11-01T09:34:07.323000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8332,
            "domain": 4819,
            "hostname": 2165,
            "FileHash-SHA256": 7369,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 23637,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906c12b1dd6a64ab1beaa55",
          "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-02T02:25:47.431000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69137ee5d76d486d65396af0",
          "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
          "description": "",
          "modified": "2025-12-01T09:02:26.881000",
          "created": "2025-11-11T18:22:29.976000",
          "tags": [
            "public tlp",
            "trojandropper",
            "other",
            "references add",
            "show",
            "provide",
            "remote",
            "t1457",
            "media content",
            "t1480",
            "subvert trust",
            "controls t1562",
            "modify tools",
            "command history",
            "ck t1027",
            "t1057",
            "discovery t1069",
            "t1071",
            "protocol t1105",
            "tool transfer",
            "t1113",
            "logging t1568",
            "t1574",
            "execution flow",
            "dll sideloading",
            "t1583",
            "ta0003",
            "ck id",
            "america",
            "att",
            "t1045",
            "capture t1140",
            "ipv4",
            "active related",
            "contact",
            "adversary",
            "tam legal",
            "qshell",
            "colorado state",
            "ahmann special",
            "counsel",
            "download",
            "ahmann",
            "university",
            "history",
            "john marshall",
            "law school",
            "special counsel",
            "christopher ahmann",
            "defense",
            "url http",
            "create new",
            "pulse provide",
            "white",
            "adversary tags",
            "add tag",
            "groups add",
            "countries add",
            "country malware",
            "trojan",
            "script urls",
            "treece alfrey",
            "meta",
            "function",
            "for privacy",
            "germany unknown",
            "united",
            "script",
            "ip address",
            "creation date",
            "date",
            "tracker",
            "null",
            "window",
            "general full",
            "reverse dns",
            "server",
            "philadelphia",
            "asn8560",
            "ionosas",
            "ionos",
            "fasthosts",
            "media",
            "telecom",
            "apache",
            "main",
            "gtagtracker",
            "gatracker",
            "brian  sabey",
            "hall render",
            "fastly error",
            "palantir",
            "special counsel",
            "gravity rat"
          ],
          "references": [
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
            "Traceback- Man with signal jammer/ deauther working around her today.",
            "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
            "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
            "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
            "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
            "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
            "Doing any evil thing for mone does not compute for me.",
            "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
            "He must be very scary like Peter Theil because every attorney took case then backed off.",
            "Patiently waiting to see what God is going to do to all of you. You take lives for $",
            "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
            "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
            "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Other",
              "display_name": "Other",
              "target": null
            },
            {
              "id": "Win.Malware.Unsafe",
              "display_name": "Win.Malware.Unsafe",
              "target": null
            },
            {
              "id": "Juko",
              "display_name": "Juko",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            },
            {
              "id": "Trojan:Win32/Generic",
              "display_name": "Trojan:Win32/Generic",
              "target": "/malware/Trojan:Win32/Generic"
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": "6905d40f781d7d58d4021a20",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7556,
            "domain": 4779,
            "hostname": 2053,
            "FileHash-SHA256": 7233,
            "FileHash-MD5": 474,
            "FileHash-SHA1": 470,
            "CVE": 4,
            "email": 4
          },
          "indicator_count": 22573,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "139 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c3bd803f15cd94aab6e287",
          "name": "Lumma Stealer | Colorado Medical Center HCA",
          "description": "Needs further investigation. Miscellaneous attack affecting Denver physicians directory. Visitors accessing the page using insecure devices may be affected. PII & PHI breached. Monitoring.",
          "modified": "2024-03-08T17:04:03.644000",
          "created": "2024-02-07T17:27:28.349000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "resolutions",
            "problems",
            "siblings domain",
            "whois whois",
            "startpage",
            "httponly",
            "samesitenone",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "language",
            "html document",
            "unicode text",
            "utf8 text",
            "doctype",
            "anchor hrefs",
            "hrefs",
            "denver",
            "tsara brashears",
            "apple ios",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "contacted urls",
            "hacktool",
            "malicious",
            "download",
            "malware",
            "relic",
            "monitoring",
            "domains",
            "eurodns sa",
            "markmonitor",
            "ip detections",
            "country",
            "graph",
            "https",
            "mitre att",
            "ta0007 network",
            "t1046 sends",
            "ssdp",
            "command",
            "control ta0011",
            "protocol t1071",
            "performs dns",
            "layer protocol",
            "number",
            "cus cndigicert",
            "ja3s",
            "subject",
            "sha2 secure",
            "server ca",
            "odigicert inc",
            "cus cnmicrosoft",
            "algorithm",
            "memory pattern",
            "file system",
            "registry",
            "registry keys",
            "process",
            "created",
            "processes tree",
            "february",
            "healthone",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "url https",
            "reverse dns",
            "general full",
            "security tls",
            "protocol h2",
            "software",
            "frankfurt",
            "main",
            "germany",
            "resource hash",
            "de indicators",
            "hashes",
            "value",
            "scriptsrcelem",
            "variables",
            "boomrmq string",
            "boomrapikey",
            "boomr function",
            "system",
            "babelpolyfill",
            "assign function",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "aes256gcm",
            "level",
            "akamaiasn1",
            "europeberlin",
            "generic malware",
            "tag count",
            "tue dec",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "root ca",
            "pattern match",
            "authority",
            "span",
            "presbyterianst",
            "luke",
            "medical center",
            "class",
            "accept",
            "date",
            "refresh",
            "blood",
            "liver cancer",
            "breast cancer",
            "lung cancer",
            "kidney cancer",
            "skin cancer",
            "sarcoma",
            "prostate cancer",
            "body",
            "facebook",
            "twitter",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "cookie",
            "command and control",
            "mitre",
            "scanning host",
            "exploit source",
            "trojan",
            "callback function",
            "targets",
            "targeting",
            "samesite=none",
            "kde",
            "konqueror",
            "phi",
            "pii",
            "wTJh.exe",
            "malware ransom trojan evader rat",
            "network",
            "rat trojan",
            "relacionada",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "matches rule",
            "emotet",
            "lockbit",
            "critical",
            "copy",
            "installer",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "ursnif",
            "core",
            "as55688 pt",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "asn as55688",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "united",
            "aaaa",
            "unknown",
            "a domains",
            "search",
            "creation date",
            "record value",
            "next",
            "pornhub",
            "anyxxxtube",
            "domain",
            "gandi sas",
            "hostname",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "pe32 packer",
            "petite",
            "vs98",
            "info compiler",
            "products",
            "header intel",
            "name md5",
            "type",
            "rticon neutral",
            "overlay",
            "dos exe",
            "threat roundup",
            "pe resource",
            "june",
            "lumma stealer",
            "ransomexx",
            "azorult",
            "njrat",
            "open",
            "problem",
            "plugx",
            "android",
            "sex_phot.jpg.exe",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "delphi generic",
            "icons library",
            "pe32 linker",
            "lcc linker",
            "empty hash",
            "tulach",
            "sabey",
            "rat",
            "remote",
            "remote access trojan"
          ],
          "references": [
            "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians",
            "https://www.hybrid-analysis.com/sample/63bf920be2401947bd686d7dd146af7f3e56800409307360105bf50cebb1c1ea",
            "www2.megawebfind.com [command and control]",
            "http://ifdnzact.com/?dn=megawebdeals.com&pid=9PO755G95 [ phishing]",
            "20.99.186.246 [exploit source]",
            "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians/ [heuristic]",
            "Win32:RATX-gen [Trj] identified.",
            "CS Sigma Rules: Shadow Copies Deletion Using Operating Systems Utilities by Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)",
            "CS Sigma Rules: Disable UAC Using Registry by frack113",
            "http://45.159.189.105/bot/regex [ tracking | botnet]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Password cracker | Patient being tracked through multiple medical systems]",
            "0-173-x.msn.com | https://twitter.com/PORNO_SEXYBABES | 0-3.duckdns.org | 0-212.pornhub.org | 000web.pornhub.org",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "CS Sigma Rules: Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
            "Remote Access Trojan"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Indonesia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Win32:RATX-gen [Trj]",
              "display_name": "Win32:RATX-gen [Trj]",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "W32/Hupigon.NCU",
              "display_name": "W32/Hupigon.NCU",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "Wiper",
              "display_name": "Wiper",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 68,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 883,
            "URL": 1412,
            "FileHash-MD5": 283,
            "FileHash-SHA1": 231,
            "FileHash-SHA256": 2909,
            "domain": 824,
            "email": 3,
            "CVE": 3
          },
          "indicator_count": 6548,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "772 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944a8149f2479b2fbc6cd1",
          "name": "Relic",
          "description": "Malicious redirect to BotNet malvertizing of a business affecting both .command YouTube distribution. YouTube encoded logins. Hacker attack, geo tracking, passwords crack, decryption, C2. Retaliation. Found in referenced Twitter link shared  with me.",
          "modified": "2024-02-01T14:01:46.735000",
          "created": "2024-01-02T17:40:17.890000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers nel",
            "maxage5184000",
            "name verdict",
            "falcon sandbox",
            "whois record",
            "ssl certificate",
            "tsara brashears",
            "whois whois",
            "historical ssl",
            "contacted",
            "highly targeted",
            "hackers",
            "botnet",
            "apple ios",
            "malicious",
            "hacktool",
            "quasar",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "file",
            "pattern match",
            "path",
            "date",
            "win64",
            "factory",
            "model",
            "comspec",
            "hybrid",
            "general",
            "click",
            "strings",
            "patch",
            "song culture",
            "tulach"
          ],
          "references": [
            "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
            "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
            "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
            "nr-data.net [Apple Private Data Collection]",
            "init.ess.apple.com [backdoor, malicious script, access via media]",
            "https://stackabuse.com/assets/images/apple",
            "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
            "location-icloud.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
            "mailtrack.io [tracking VirusTotal graphs, link trace back]",
            "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
            "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
            "https://pin.it/ [faux Pinterest for TB]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
            "114.114.114.114 [ Tulach Malware IP]",
            "13.107.136.8  [ Tulach Malware IP redirect]",
            "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
            "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
            "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
            "http://114.114.114.114/ipw.ps1",
            "194.245.148.189 [CnC]",
            "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
            "http://109.206.241.129/666bins/666.mpsl",
            "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
            "143.244.50.213 |169.150.249.162  [malware_hosting]",
            "http://watchhers.net/index.php [malware spreader]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "xred.mooo.com [pornhub trojan]",
            "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
            "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
            "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8049,
            "FileHash-MD5": 388,
            "FileHash-SHA1": 212,
            "FileHash-SHA256": 7062,
            "domain": 4401,
            "hostname": 2653,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 22769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c5970817e6bf8b0e5b5ff",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:48.087000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 339,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c597a4a45c8d84f0b15c1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:00:58.166000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c606d74f82e547c77ad89",
          "name": "Ransom.Win64.PORNOASSET.SM1 | DeepScan:Generic.Ransom.GandCrab5",
          "description": "Ransom.Win64.PORNOASSET.SM1 DeepScan:Generic.Ransom.GandCrab5\nBlackNET RAT $WebWatson\nAuto generated results from a variety of tools.",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T04:30:37.089000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 338,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29ff31857aafba0358e1",
          "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-09T18:50:39.675000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c597a4a45c8d84f0b15c1",
          "export_count": 341,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6558126013aef7ce80968842",
          "name": "PuffStealer",
          "description": "",
          "modified": "2023-12-09T03:01:57.989000",
          "created": "2023-11-18T01:24:48.887000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "communicating",
            "contacted",
            "resolutions",
            "whois record",
            "whois whois",
            "whois parent",
            "whois siblings",
            "skynet",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "million",
            "team",
            "microsoft",
            "back",
            "download",
            "phishing",
            "union",
            "bank",
            "malicious site",
            "blacklist http",
            "exit",
            "traffic",
            "node tcp",
            "tor known",
            "tor relayrouter",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "spammer",
            "malware",
            "dropped",
            "unlocker",
            "http",
            "critical risk",
            "redline stealer",
            "core",
            "hacktool",
            "execution",
            "type win32",
            "exe size",
            "first seen",
            "file name",
            "avast win32",
            "win32",
            "avg win32",
            "fortinet",
            "vitro",
            "mb first",
            "rmndrp",
            "clean mx",
            "undetected dns8",
            "undetected vx",
            "sophos",
            "vault",
            "zdb zeus",
            "cmc threat",
            "snort ip",
            "feodo tracker",
            "cybereason",
            "send bug",
            "pe yandex",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "algorithm",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "first",
            "seen",
            "valid",
            "no na",
            "no no",
            "ip security",
            "cndst root",
            "ca x3",
            "ca id",
            "research group",
            "cnisrg root",
            "no expired",
            "mozilla",
            "android",
            "malicious red team",
            "tsara brashears",
            "cyber stalking",
            "malvertizing",
            "invasion of privacy",
            "threat",
            "adult content",
            "apple",
            "iphone unlocker",
            "android",
            "exploited spyware",
            "malware host",
            "brute force",
            "revenge-rat",
            "banker",
            "evasive",
            "domain",
            "redline",
            "stealer",
            "phishing",
            "ramnit",
            "unreliable subdomains",
            "dridex",
            "gating",
            "msil",
            "rat",
            "loki",
            "network",
            "hacking",
            "sinkhole",
            "azorult",
            "c2",
            "historicalandnew",
            "targeted attack",
            "puffstealer",
            "rultazo",
            "lokibot",
            "loki pws",
            "burkina",
            "banker,dde,dridex,exploit",
            "banker,dridex,evasive",
            "trickbot",
            "ransomware,torrentlocker",
            "exploit_source",
            "blacknet",
            "FileRepMalware",
            "linux agent",
            "blacknet",
            "ios",
            "phishing paypal",
            "tagging",
            "defacement",
            "hit",
            "bounty",
            "phishing site",
            "malware site",
            "malware download",
            "endangerment",
            "Malicious domain - SANS Internet Storm Center",
            "evasive,msil,rat,revenge-rat",
            "prism_setting",
            "prism_object",
            "static engine",
            "social engineering",
            "jansky",
            "worm",
            "network rat",
            "networm",
            "Loki Password Stealer (PWS)",
            "South Carolina Federal Credit Union phishing",
            "darkweb",
            "yandex",
            "redirectors",
            "blacknet threats",
            "phishing,ransomware,sinkhole",
            "wanacrypt0r,wannacry,wcry",
            "tor c++",
            "tor c++ client",
            "python user",
            "js user",
            "hacker",
            "hijacker",
            "heur",
            "maltiverse",
            "alexa top",
            "exploit",
            "riskware",
            "unsafe",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
            "malicious url",
            "financial",
            "blacknet rat",
            "azorult",
            "stealer",
            "deep scan",
            "blacklist https",
            "referrer",
            "collections kp",
            "incident ip",
            "sneaky server",
            "replacement",
            "unauthorized",
            "emotet",
            "noname057",
            "generic malware",
            "engineering",
            "cyber threat",
            "facebook",
            "paypal",
            "dropbox",
            "united",
            "america",
            "banking",
            "wells fargo",
            "steam",
            "twitter",
            "sliver",
            "daum",
            "swift",
            "runescape",
            "betabot",
            "district",
            "iframe",
            "alexa",
            "downldr",
            "agent",
            "presenoker",
            "bladabindi",
            "live",
            "conduit",
            "pony",
            "covid19",
            "malicious",
            "cobalt strike",
            "suppobox",
            "ramnit",
            "meterpreter",
            "virut",
            "njrat",
            "pykspa",
            "asyncrat",
            "downloader",
            "fakealert",
            "binder",
            "virustotal",
            "formbook",
            "necurs",
            "trojan",
            "msil",
            "hiloti",
            "vawtrak",
            "simda",
            "kraken",
            "solimba",
            "icedid",
            "redirector",
            "suspic",
            "amadey",
            "raccoon",
            "nanocore rat",
            "revenge rat",
            "genkryptik",
            "fuery",
            "wacatac",
            "service",
            "cloudeye",
            "tinba",
            "domaiq",
            "ave maria",
            "zeus",
            "ransomware",
            "zbot",
            "generic",
            "trojanspy",
            "states",
            "inmortal",
            "locky",
            "strike",
            "china cobalt",
            "keybase",
            "cutwail",
            "citadel",
            "radamant",
            "kovter",
            "bradesco",
            "nymaim",
            "amonetize",
            "bondat",
            "ghost rat",
            "vjw0rm",
            "bandoo",
            "matsnu",
            "dnspionage",
            "darkgate",
            "vidar",
            "keylogger",
            "remcos",
            "agenttesla",
            "detplock",
            "win64",
            "smokeloader",
            "agent tesla",
            "kgs0",
            "kls0",
            "urls",
            "type name",
            "dns replication",
            "date",
            "domain",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "drpsuinstaller",
            "vdfsurfs",
            "opera",
            "icwrmind",
            "notepad",
            "installer",
            "miner",
            "unknown",
            "networm",
            "houdini",
            "quasar rat",
            "gamehack",
            "dbatloader",
            "qakbot",
            "ursnif",
            "CVE-2005-1790",
            "CVE-2009-3672",
            "CVE-2010-3962",
            "CVE-2012-3993",
            "CVE-2014-6332",
            "CVE-2017-11882",
            "CVE-2020-0601",
            "CVE-2020-0674",
            "hallrender.com",
            "brian sabey",
            "insurance",
            "botnetwork",
            "botmaster",
            "command_and_control",
            "CVE-2021-27065",
            "CVE-2021-40444",
            "CVE-2023-4966",
            "CVE-2017-0199",
            "CVE-2018-4893",
            "CVE-2010-3333",
            "CVE-2015-1641",
            "CVE-2017-0147",
            "CVE-2017-8570",
            "CVE-2018-0802",
            "CVE-2018-8373",
            "CVE-2017-8759",
            "CVE-2018-8453",
            "CVE-2014-3153",
            "CVE-2015-1650",
            "CVE-2017-0143",
            "CVE-2017-8464",
            "Icefog",
            "Delf.NBX",
            "$WebWatson",
            "Gen:Heur.Ransom.HiddenTears",
            "mobilekey.pw",
            "bitbucket.org",
            "Anomalous.100%",
            "malware distribution site",
            "gootkit",
            "edsaid",
            "rightsaided",
            "betabot",
            "cobaltstrike4.tk",
            "mas.to",
            "BehavesLike.YahLover",
            "srdvd16010404",
            "languageenu",
            "buildno",
            "channelisales",
            "vendorname2581",
            "osregion",
            "device",
            "systemlocale",
            "majorver16",
            "quasar",
            "find",
            "lockbit",
            "chaos",
            "ransomexx",
            "grandoreiro",
            "evilnum",
            "banker"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
            "20.99.186.246 exploit source",
            "fp2e7a.wpc.2be4.phicdn.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
            "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
            "init.ess.apple.com         (malicious code script)",
            "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
            "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
            "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
            "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
            "IPv4 45.12.253.72.            command_and_control",
            "Hostname: ddos.dnsnb8.net                        command_and_control",
            "IPv4 95.213.186.51              command_and_control",
            "Hostname: www.supernetforme.com      command_and_control",
            "IPv4 103.224.182.246        command_and_control",
            "IPv4 72.251.233.245           command_and_control",
            "IPv4 63.251.106.25             command_and_control",
            "IPv4 45.15.156.208            command_and_control",
            "IPv4 104.247.81.51             command_and_control",
            "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
            "https://downloaddevtools.ir/     (phishing)",
            "happylifehappywife.com",
            "apples.encryptedwork.com        (Interesting in the blacknet)",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
            "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
            "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
            "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
            "http://init-p01st.push.apple.com/bag            (malicious web creator)",
            "opencve.djgummikuh.de        (CVE dispensary)",
            "Maltiverse Research Team",
            "URLscan.io",
            "Deep Research",
            "Hybrid Analysis",
            "URLhaus Abuse.ch",
            "Cyber Threat Coalition",
            "ThreatFox Abuse.ch"
          ],
          "public": 1,
          "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
          "targeted_countries": [
            "United States of America",
            "France",
            "Spain"
          ],
          "malware_families": [
            {
              "id": "Feodo",
              "display_name": "Feodo",
              "target": null
            },
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            },
            {
              "id": "Redline Stealer",
              "display_name": "Redline Stealer",
              "target": null
            },
            {
              "id": "Ramnit.N",
              "display_name": "Ramnit.N",
              "target": null
            },
            {
              "id": "Loki Bot",
              "display_name": "Loki Bot",
              "target": null
            },
            {
              "id": "Loki Password Stealer (PWS)",
              "display_name": "Loki Password Stealer (PWS)",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Zbd Zeus",
              "display_name": "Zbd Zeus",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Burkina",
              "display_name": "Trojan:MSIL/Burkina",
              "target": "/malware/Trojan:MSIL/Burkina"
            },
            {
              "id": "Generic.TrickBot.1",
              "display_name": "Generic.TrickBot.1",
              "target": null
            },
            {
              "id": "Exploit.CVE",
              "display_name": "Exploit.CVE",
              "target": null
            },
            {
              "id": "Injector.IS.gen",
              "display_name": "Injector.IS.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Razy",
              "display_name": "Gen:Variant.Razy",
              "target": null
            },
            {
              "id": "Trojan.Androm.Gen",
              "display_name": "Trojan.Androm.Gen",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Linux.Agent",
              "display_name": "HEUR:Trojan.Linux.Agent",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "VBA.Downloader",
              "display_name": "VBA.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Notifier",
              "display_name": "Trojan.Notifier",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Alien",
              "display_name": "HEUR:Trojan.MSOffice.Alien",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_100%",
              "display_name": "Unsafe.AI_Score_100%",
              "target": null
            },
            {
              "id": "Gen:Variant.Johnnie",
              "display_name": "Gen:Variant.Johnnie",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan:Python/Downldr",
              "display_name": "Trojan:Python/Downldr",
              "target": "/malware/Trojan:Python/Downldr"
            },
            {
              "id": "Trojan:Linux/Downldr",
              "display_name": "Trojan:Linux/Downldr",
              "target": "/malware/Trojan:Linux/Downldr"
            },
            {
              "id": "Trojan:VBA/Downldr",
              "display_name": "Trojan:VBA/Downldr",
              "target": "/malware/Trojan:VBA/Downldr"
            },
            {
              "id": "TrojanDownloader:Linux/Downldr",
              "display_name": "TrojanDownloader:Linux/Downldr",
              "target": "/malware/TrojanDownloader:Linux/Downldr"
            },
            {
              "id": "Kryptik.FPH.gen",
              "display_name": "Kryptik.FPH.gen",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Phish.JAT",
              "display_name": "Phish.JAT",
              "target": null
            },
            {
              "id": "Phishing.HTML",
              "display_name": "Phishing.HTML",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "Phish.AB",
              "display_name": "Phish.AB",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "ml.Generic",
              "display_name": "ml.Generic",
              "target": null
            },
            {
              "id": "Xegumumune.8596c22f",
              "display_name": "Xegumumune.8596c22f",
              "target": null
            },
            {
              "id": "Generic.Malware.SMYB",
              "display_name": "Generic.Malware.SMYB",
              "target": null
            },
            {
              "id": "malicious.moderate.ml",
              "display_name": "malicious.moderate.ml",
              "target": null
            },
            {
              "id": "Agent.NBAE",
              "display_name": "Agent.NBAE",
              "target": null
            },
            {
              "id": "AGEN.1045227",
              "display_name": "AGEN.1045227",
              "target": null
            },
            {
              "id": "Riskware.Agent",
              "display_name": "Riskware.Agent",
              "target": null
            },
            {
              "id": "Gen:Variant.Cerbu",
              "display_name": "Gen:Variant.Cerbu",
              "target": null
            },
            {
              "id": "IL:Trojan.MSILZilla",
              "display_name": "IL:Trojan.MSILZilla",
              "target": null
            },
            {
              "id": "Dropped:Generic.Ransom.DMR",
              "display_name": "Dropped:Generic.Ransom.DMR",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Trojan.Heur",
              "display_name": "Trojan.Heur",
              "target": null
            },
            {
              "id": "Trojan.Malware.300983",
              "display_name": "Trojan.Malware.300983",
              "target": null
            },
            {
              "id": "SdBot.CAOC",
              "display_name": "SdBot.CAOC",
              "target": null
            },
            {
              "id": "Trojan.DelShad",
              "display_name": "Trojan.DelShad",
              "target": null
            },
            {
              "id": "Exploit CVE-2017-11882",
              "display_name": "Exploit CVE-2017-11882",
              "target": null
            },
            {
              "id": "GameHack.NL",
              "display_name": "GameHack.NL",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink",
              "display_name": "JS:Trojan.HideLink",
              "target": null
            },
            {
              "id": "Script.Agent",
              "display_name": "Script.Agent",
              "target": null
            },
            {
              "id": "Macro.Agent",
              "display_name": "Macro.Agent",
              "target": null
            },
            {
              "id": "Macro.Downloader.AMIP",
              "display_name": "Macro.Downloader.AMIP",
              "target": null
            },
            {
              "id": "Trojan.VBA",
              "display_name": "Trojan.VBA",
              "target": null
            },
            {
              "id": "HEUR.VBA.Trojan",
              "display_name": "HEUR.VBA.Trojan",
              "target": null
            },
            {
              "id": "VB.EmoooDldr.10",
              "display_name": "VB.EmoooDldr.10",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Packed-GV",
              "display_name": "Packed-GV",
              "target": null
            },
            {
              "id": "Adware.InstallMonetizer",
              "display_name": "Adware.InstallMonetizer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Zpevdo.B",
              "display_name": "Zpevdo.B",
              "target": null
            },
            {
              "id": "Presenoker",
              "display_name": "Presenoker",
              "target": null
            },
            {
              "id": "SGeneric",
              "display_name": "SGeneric",
              "target": null
            },
            {
              "id": "GameHack.DOM",
              "display_name": "GameHack.DOM",
              "target": null
            },
            {
              "id": "BehavesLike.Ransom",
              "display_name": "BehavesLike.Ransom",
              "target": null
            },
            {
              "id": "CIL.StupidCryptor",
              "display_name": "CIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.MSIL",
              "display_name": "Gen:Heur.Ransom.MSIL",
              "target": null
            },
            {
              "id": "Black.Gen2",
              "display_name": "Black.Gen2",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Trojan.HTML.PHISH",
              "display_name": "Trojan.HTML.PHISH",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Program.Unwanted",
              "display_name": "Program.Unwanted",
              "target": null
            },
            {
              "id": "HEUR/QVM42.3.72EB.Malware",
              "display_name": "HEUR/QVM42.3.72EB.Malware",
              "target": null
            },
            {
              "id": "suspicious.low.ml",
              "display_name": "suspicious.low.ml",
              "target": null
            },
            {
              "id": "JS:Trojan.Cryxos",
              "display_name": "JS:Trojan.Cryxos",
              "target": null
            },
            {
              "id": "Suspicious_GEN.F47V0520",
              "display_name": "Suspicious_GEN.F47V0520",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Generic",
              "display_name": "Dropper.Trojan.Generic",
              "target": null
            },
            {
              "id": "Trojan.TrickBot",
              "display_name": "Trojan.TrickBot",
              "target": null
            },
            {
              "id": "Malware.Tk.Generic",
              "display_name": "Malware.Tk.Generic",
              "target": null
            },
            {
              "id": "TrojanSpy.Java",
              "display_name": "TrojanSpy.Java",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "BehavesLike.Exploit",
              "display_name": "BehavesLike.Exploit",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34128",
              "display_name": "Gen:NN.ZemsilF.34128",
              "target": null
            },
            {
              "id": "Wacapew.C",
              "display_name": "Wacapew.C",
              "target": null
            },
            {
              "id": "Trojan.Malware.121218",
              "display_name": "Trojan.Malware.121218",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Trojan.Generic",
              "display_name": "Trojan.Generic",
              "target": null
            },
            {
              "id": "W32.Trojan",
              "display_name": "W32.Trojan",
              "target": null
            },
            {
              "id": "BScope.Riskware",
              "display_name": "BScope.Riskware",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147",
              "display_name": "Ransom:Win32/CVE-2017-0147",
              "target": "/malware/Ransom:Win32/CVE-2017-0147"
            },
            {
              "id": "Virus.Ramnit",
              "display_name": "Virus.Ramnit",
              "target": null
            },
            {
              "id": "Virus.Virut",
              "display_name": "Virus.Virut",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "AGEN.1141126",
              "display_name": "AGEN.1141126",
              "target": null
            },
            {
              "id": "W32.AIDetect",
              "display_name": "W32.AIDetect",
              "target": null
            },
            {
              "id": "Trojan.Python",
              "display_name": "Trojan.Python",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "Suspicious.Save",
              "display_name": "Suspicious.Save",
              "target": null
            },
            {
              "id": "Adware.Downware",
              "display_name": "Adware.Downware",
              "target": null
            },
            {
              "id": "Ransom.Win64.Wacatac.oa",
              "display_name": "Ransom.Win64.Wacatac.oa",
              "target": null
            },
            {
              "id": "OpenSubtitles.A",
              "display_name": "OpenSubtitles.A",
              "target": null
            },
            {
              "id": "VB.EmoDldr.4",
              "display_name": "VB.EmoDldr.4",
              "target": null
            },
            {
              "id": "Gen:Variant.Midie",
              "display_name": "Gen:Variant.Midie",
              "target": null
            },
            {
              "id": "HEUR/QVM41.2.DA9B.Malware",
              "display_name": "HEUR/QVM41.2.DA9B.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Sirefef",
              "display_name": "Gen:Variant.Sirefef",
              "target": null
            },
            {
              "id": "Macro.Trojan.Dropperd",
              "display_name": "Macro.Trojan.Dropperd",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "Redcap.rlhse",
              "display_name": "Redcap.rlhse",
              "target": null
            },
            {
              "id": "Trojan.Trickster",
              "display_name": "Trojan.Trickster",
              "target": null
            },
            {
              "id": "HTML_REDIR.SMR",
              "display_name": "HTML_REDIR.SMR",
              "target": null
            },
            {
              "id": "TROJ_FRS.VSNTFK19",
              "display_name": "TROJ_FRS.VSNTFK19",
              "target": null
            },
            {
              "id": "Hoax.JS.Phish",
              "display_name": "Hoax.JS.Phish",
              "target": null
            },
            {
              "id": "JS:Iframe",
              "display_name": "JS:Iframe",
              "target": null
            },
            {
              "id": "Application.SQLCrack",
              "display_name": "Application.SQLCrack",
              "target": null
            },
            {
              "id": "susp.lnk",
              "display_name": "susp.lnk",
              "target": null
            },
            {
              "id": "QVM201.0.B70B.Malware",
              "display_name": "QVM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebMonitor RAT",
              "display_name": "WebMonitor RAT",
              "target": null
            },
            {
              "id": "Tor - S0183",
              "display_name": "Tor - S0183",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "WannaCryptor",
              "display_name": "WannaCryptor",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.GandCrab5",
              "display_name": "DeepScan:Generic.Ransom.GandCrab5",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "Delf.NBX",
              "display_name": "Delf.NBX",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.32515",
              "display_name": "Gen:NN.ZexaF.32515",
              "target": null
            },
            {
              "id": "FileRepMalware",
              "display_name": "FileRepMalware",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILPerseus",
              "display_name": "Gen:Variant.MSILPerseus",
              "target": null
            },
            {
              "id": "Icefog",
              "display_name": "Icefog",
              "target": null
            },
            {
              "id": "$WebWatson",
              "display_name": "$WebWatson",
              "target": null
            },
            {
              "id": "Agent.AIK.gen",
              "display_name": "Agent.AIK.gen",
              "target": null
            },
            {
              "id": "Agent.AIK.genCIL.StupidCryptor",
              "display_name": "Agent.AIK.genCIL.StupidCryptor",
              "target": null
            },
            {
              "id": "Agent.YPEZ",
              "display_name": "Agent.YPEZ",
              "target": null
            },
            {
              "id": "Application.InnovativSol",
              "display_name": "Application.InnovativSol",
              "target": null
            },
            {
              "id": "Agent.ASO",
              "display_name": "Agent.ASO",
              "target": null
            },
            {
              "id": "S-b748adc5",
              "display_name": "S-b748adc5",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "Kryptik.GUCB",
              "display_name": "Kryptik.GUCB",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Autoit.bimwt",
              "display_name": "Autoit.bimwt",
              "target": null
            },
            {
              "id": "HEUR:Trojan.OLE2.Alien",
              "display_name": "HEUR:Trojan.OLE2.Alien",
              "target": null
            },
            {
              "id": "AGEN.1038489",
              "display_name": "AGEN.1038489",
              "target": null
            },
            {
              "id": "Gen:Variant.Ser.Strictor",
              "display_name": "Gen:Variant.Ser.Strictor",
              "target": null
            },
            {
              "id": "Packed.Themida.Gen",
              "display_name": "Packed.Themida.Gen",
              "target": null
            },
            {
              "id": "AGEN.1043164",
              "display_name": "AGEN.1043164",
              "target": null
            },
            {
              "id": "TrickBot - S0266",
              "display_name": "TrickBot - S0266",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.PornoAsset",
              "display_name": "Trojan.PornoAsset",
              "target": null
            },
            {
              "id": "Ransom.Win64.PORNOASSET.SM1",
              "display_name": "Ransom.Win64.PORNOASSET.SM1",
              "target": null
            },
            {
              "id": "Gen:Variant.Ulise",
              "display_name": "Gen:Variant.Ulise",
              "target": null
            },
            {
              "id": "Trojan.Win64",
              "display_name": "Trojan.Win64",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Pantera.10",
              "display_name": "Heur.BZC.YAX.Pantera.10",
              "target": null
            },
            {
              "id": "malicious.high.ml",
              "display_name": "malicious.high.ml",
              "target": null
            },
            {
              "id": "CVE-2015-1650",
              "display_name": "CVE-2015-1650",
              "target": null
            },
            {
              "id": "Worm.Win64.AutoRun",
              "display_name": "Worm.Win64.AutoRun",
              "target": null
            },
            {
              "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "Pua.Gen",
              "display_name": "Pua.Gen",
              "target": null
            },
            {
              "id": "Trojan.Downloader.Generic",
              "display_name": "Trojan.Downloader.Generic",
              "target": null
            },
            {
              "id": "Suspected of Trojan.Downloader.gen",
              "display_name": "Suspected of Trojan.Downloader.gen",
              "target": null
            },
            {
              "id": "HEUR:RemoteAdmin.Generic",
              "display_name": "HEUR:RemoteAdmin.Generic",
              "target": null
            },
            {
              "id": "Gen:Heur.Ransom.HiddenTears",
              "display_name": "Gen:Heur.Ransom.HiddenTears",
              "target": null
            },
            {
              "id": "Nemucod.A",
              "display_name": "Nemucod.A",
              "target": null
            },
            {
              "id": "Backdoor.Hupigon",
              "display_name": "Backdoor.Hupigon",
              "target": null
            },
            {
              "id": "Trojan.Starter JS.Iframe",
              "display_name": "Trojan.Starter JS.Iframe",
              "target": null
            },
            {
              "id": "fake ,promethiumm ,strongpity",
              "display_name": "fake ,promethiumm ,strongpity",
              "target": null
            },
            {
              "id": "PUA.Reg1staid",
              "display_name": "PUA.Reg1staid",
              "target": null
            },
            {
              "id": "Malware.Heur_Generic.A",
              "display_name": "Malware.Heur_Generic.A",
              "target": null
            },
            {
              "id": "Bladabindi.Q",
              "display_name": "Bladabindi.Q",
              "target": null
            },
            {
              "id": "W32.eHeur",
              "display_name": "W32.eHeur",
              "target": null
            },
            {
              "id": "malicious.6e0700",
              "display_name": "malicious.6e0700",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "RedCap.vneda",
              "display_name": "RedCap.vneda",
              "target": null
            },
            {
              "id": "Trojan.Indiloadz",
              "display_name": "Trojan.Indiloadz",
              "target": null
            },
            {
              "id": "Trojan.Ekstak",
              "display_name": "Trojan.Ekstak",
              "target": null
            },
            {
              "id": "staticrr.paleokits.net",
              "display_name": "staticrr.paleokits.net",
              "target": null
            },
            {
              "id": "MSIL.Downloader",
              "display_name": "MSIL.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Autoruns.GenericKDS",
              "display_name": "Trojan.Autoruns.GenericKDS",
              "target": null
            },
            {
              "id": "MSIL.Trojan.BSE",
              "display_name": "MSIL.Trojan.BSE",
              "target": null
            },
            {
              "id": "Adload.AD81",
              "display_name": "Adload.AD81",
              "target": null
            },
            {
              "id": "Packed.Asprotect",
              "display_name": "Packed.Asprotect",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34062",
              "display_name": "Gen:NN.ZemsilF.34062",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Agent.pwc",
              "display_name": "Agent.pwc",
              "target": null
            },
            {
              "id": "RiskTool.Phpw",
              "display_name": "RiskTool.Phpw",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Trojan.PWS",
              "display_name": "Trojan.PWS",
              "target": null
            },
            {
              "id": "Generic.BitCoinMiner.3",
              "display_name": "Generic.BitCoinMiner.3",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "Gen:NN",
              "display_name": "Gen:NN",
              "target": null
            },
            {
              "id": "Downloader.CertutilURLCache",
              "display_name": "Downloader.CertutilURLCache",
              "target": null
            },
            {
              "id": "Elf",
              "display_name": "Elf",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Kryptik.NRD",
              "display_name": "Kryptik.NRD",
              "target": null
            },
            {
              "id": "Riskware",
              "display_name": "Riskware",
              "target": null
            },
            {
              "id": "Kuluoz.B.gen",
              "display_name": "Kuluoz.B.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.RevengeRat",
              "display_name": "Gen:Variant.RevengeRat",
              "target": null
            },
            {
              "id": "Gen:Variant.Mikey",
              "display_name": "Gen:Variant.Mikey",
              "target": null
            },
            {
              "id": "VB.Chronos.7",
              "display_name": "VB.Chronos.7",
              "target": null
            },
            {
              "id": "Kryptik.NOE",
              "display_name": "Kryptik.NOE",
              "target": null
            },
            {
              "id": "HEUR:WebToolbar.Generic",
              "display_name": "HEUR:WebToolbar.Generic",
              "target": null
            },
            {
              "id": "Gen:Variant.Barys",
              "display_name": "Gen:Variant.Barys",
              "target": null
            },
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Gen:Variant.Graftor",
              "display_name": "Gen:Variant.Graftor",
              "target": null
            },
            {
              "id": "Backdoor.Agent",
              "display_name": "Backdoor.Agent",
              "target": null
            },
            {
              "id": "Unsafe",
              "display_name": "Unsafe",
              "target": null
            },
            {
              "id": "Trojan.PHP.Agent",
              "display_name": "Trojan.PHP.Agent",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Generic",
              "display_name": "HEUR:Exploit.Generic",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMALYM",
              "display_name": "Ransom_WCRY.SMALYM",
              "target": null
            },
            {
              "id": "Ransom_WCRY.SMJ",
              "display_name": "Ransom_WCRY.SMJ",
              "target": null
            },
            {
              "id": "Auslogics",
              "display_name": "Auslogics",
              "target": null
            },
            {
              "id": "Gen:Variant.Jaiko",
              "display_name": "Gen:Variant.Jaiko",
              "target": null
            },
            {
              "id": "Exploit.W32.Agent",
              "display_name": "Exploit.W32.Agent",
              "target": null
            },
            {
              "id": "Trojan.Cud.Gen",
              "display_name": "Trojan.Cud.Gen",
              "target": null
            },
            {
              "id": "Trojan.DOC.Downloader",
              "display_name": "Trojan.DOC.Downloader",
              "target": null
            },
            {
              "id": "Backdoor.MSIL.Agent",
              "display_name": "Backdoor.MSIL.Agent",
              "target": null
            },
            {
              "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Kazy",
              "display_name": "Gen:Variant.Kazy",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Ransom.WannaCrypt",
              "display_name": "Ransom.WannaCrypt",
              "target": null
            },
            {
              "id": "Generic.ServStart.A",
              "display_name": "Generic.ServStart.A",
              "target": null
            },
            {
              "id": "Trojan.Wanna",
              "display_name": "Trojan.Wanna",
              "target": null
            },
            {
              "id": "Generic.MSIL.Bladabindi",
              "display_name": "Generic.MSIL.Bladabindi",
              "target": null
            },
            {
              "id": "TROJ_GEN.R002C0OG518",
              "display_name": "TROJ_GEN.R002C0OG518",
              "target": null
            },
            {
              "id": "Trojan.Chapak",
              "display_name": "Trojan.Chapak",
              "target": null
            },
            {
              "id": "Indiloadz.BB",
              "display_name": "Indiloadz.BB",
              "target": null
            },
            {
              "id": "BehavBehavesLike.PUPXBI",
              "display_name": "BehavBehavesLike.PUPXBI",
              "target": null
            },
            {
              "id": "DeepScan:Generic.SpyAgent.6",
              "display_name": "DeepScan:Generic.SpyAgent.6",
              "target": null
            },
            {
              "id": "Python.KeyLogger",
              "display_name": "Python.KeyLogger",
              "target": null
            },
            {
              "id": "GameHack.CRS",
              "display_name": "GameHack.CRS",
              "target": null
            },
            {
              "id": "Generic.MSIL.PasswordStealer",
              "display_name": "Generic.MSIL.PasswordStealer",
              "target": null
            },
            {
              "id": "PSW.Agent",
              "display_name": "PSW.Agent",
              "target": null
            },
            {
              "id": "malicious.8c45ba",
              "display_name": "malicious.8c45ba",
              "target": null
            },
            {
              "id": "Dropper.Binder",
              "display_name": "Dropper.Binder",
              "target": null
            },
            {
              "id": "Constructor.MSIL",
              "display_name": "Constructor.MSIL",
              "target": null
            },
            {
              "id": "Linux.Agent",
              "display_name": "Linux.Agent",
              "target": null
            },
            {
              "id": "Virus.3DMax.Script",
              "display_name": "Virus.3DMax.Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Application.SearchProtect",
              "display_name": "Application.SearchProtect",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Faceliker.A",
              "display_name": "Faceliker.A",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Faceliker",
              "display_name": "JS:Trojan.JS.Faceliker",
              "target": null
            },
            {
              "id": "Constructor.MSIL  Linux.Agent",
              "display_name": "Constructor.MSIL  Linux.Agent",
              "target": null
            },
            {
              "id": "PowerShell.Trojan",
              "display_name": "PowerShell.Trojan",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "W32.AIDetectVM",
              "display_name": "W32.AIDetectVM",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "Injector.CLDS",
              "display_name": "Injector.CLDS",
              "target": null
            },
            {
              "id": "VB.Downloader.2",
              "display_name": "VB.Downloader.2",
              "target": null
            },
            {
              "id": "malicious.3e78cc",
              "display_name": "malicious.3e78cc",
              "target": null
            },
            {
              "id": "malicious.d800d6",
              "display_name": "malicious.d800d6",
              "target": null
            },
            {
              "id": "VB.PwShell.2",
              "display_name": "VB.PwShell.2",
              "target": null
            },
            {
              "id": "Backdoor.RBot",
              "display_name": "Backdoor.RBot",
              "target": null
            },
            {
              "id": "malicious.71b1a8",
              "display_name": "malicious.71b1a8",
              "target": null
            },
            {
              "id": "TrojanSpy.KeyLogger",
              "display_name": "TrojanSpy.KeyLogger",
              "target": null
            },
            {
              "id": "Injector.JDO",
              "display_name": "Injector.JDO",
              "target": null
            },
            {
              "id": "Heur.Msword.Gen",
              "display_name": "Heur.Msword.Gen",
              "target": null
            },
            {
              "id": "PSW.Discord",
              "display_name": "PSW.Discord",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "HEUR:AdWare.StartSurf",
              "display_name": "HEUR:AdWare.StartSurf",
              "target": null
            },
            {
              "id": "Gen:Heur.NoobyProtect",
              "display_name": "Gen:Heur.NoobyProtect",
              "target": null
            },
            {
              "id": "CIL.HeapOverride",
              "display_name": "CIL.HeapOverride",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Tasker",
              "display_name": "HEUR:Trojan.Tasker",
              "target": null
            },
            {
              "id": "XLM.Trojan.Abracadabra.27",
              "display_name": "XLM.Trojan.Abracadabra.27",
              "target": null
            },
            {
              "id": "HEUR:Backdoor.MSIL.NanoBot",
              "display_name": "HEUR:Backdoor.MSIL.NanoBot",
              "target": null
            },
            {
              "id": "Trojan.PSW.Mimikatz",
              "display_name": "Trojan.PSW.Mimikatz",
              "target": null
            },
            {
              "id": "TrojanSpy.Python",
              "display_name": "TrojanSpy.Python",
              "target": null
            },
            {
              "id": "Trojan.Ole2.Vbs",
              "display_name": "Trojan.Ole2.Vbs",
              "target": null
            },
            {
              "id": "Exploit.MSOffice",
              "display_name": "Exploit.MSOffice",
              "target": null
            },
            {
              "id": "DeepScan:Generic.Ransom.AmnesiaE",
              "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
              "target": null
            },
            {
              "id": "Wacatac.D6",
              "display_name": "Wacatac.D6",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "Packed.NetSeal",
              "display_name": "Packed.NetSeal",
              "target": null
            },
            {
              "id": "Trojan.MSIL.Injector",
              "display_name": "Trojan.MSIL.Injector",
              "target": null
            },
            {
              "id": "Trojan.PWS.Agent",
              "display_name": "Trojan.PWS.Agent",
              "target": null
            },
            {
              "id": "TScope.Trojan",
              "display_name": "TScope.Trojan",
              "target": null
            },
            {
              "id": "PSW.Stealer",
              "display_name": "PSW.Stealer",
              "target": null
            },
            {
              "id": "Trojan.PackedNET",
              "display_name": "Trojan.PackedNET",
              "target": null
            },
            {
              "id": "Trojan.Java",
              "display_name": "Trojan.Java",
              "target": null
            },
            {
              "id": "MalwareX",
              "display_name": "MalwareX",
              "target": null
            },
            {
              "id": "Trojan.PSW.Python",
              "display_name": "Trojan.PSW.Python",
              "target": null
            },
            {
              "id": "malicious.11abfc",
              "display_name": "malicious.11abfc",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSIL.Tasker",
              "display_name": "HEUR:Trojan.MSIL.Tasker",
              "target": null
            },
            {
              "id": "PossibleThreat.PALLAS",
              "display_name": "PossibleThreat.PALLAS",
              "target": null
            },
            {
              "id": "Backdoor.Poison",
              "display_name": "Backdoor.Poison",
              "target": null
            },
            {
              "id": "Generic.MSIL.LimeRAT",
              "display_name": "Generic.MSIL.LimeRAT",
              "target": null
            },
            {
              "id": "PWS-FCZZ",
              "display_name": "PWS-FCZZ",
              "target": null
            },
            {
              "id": "Trojan.Script",
              "display_name": "Trojan.Script",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Trojan.PWS.Growtopia",
              "display_name": "Trojan.PWS.Growtopia",
              "target": null
            },
            {
              "id": "Spyware.Bobik",
              "display_name": "Spyware.Bobik",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Hack.Patcher",
              "display_name": "Hack.Patcher",
              "target": null
            },
            {
              "id": "PWS.p",
              "display_name": "PWS.p",
              "target": null
            },
            {
              "id": "Suppobox",
              "display_name": "Suppobox",
              "target": null
            },
            {
              "id": "index.php",
              "display_name": "index.php",
              "target": null
            },
            {
              "id": "Packed.VMProtect",
              "display_name": "Packed.VMProtect",
              "target": null
            },
            {
              "id": "SmokeLoader",
              "display_name": "SmokeLoader",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.SAgent",
              "display_name": "HEUR:Trojan.MSOffice.SAgent",
              "target": null
            },
            {
              "id": "Script.INF",
              "display_name": "Script.INF",
              "target": null
            },
            {
              "id": "JS:Trojan.JS.Likejack",
              "display_name": "JS:Trojan.JS.Likejack",
              "target": null
            },
            {
              "id": "SNH:Script [Dropper]",
              "display_name": "SNH:Script [Dropper]",
              "target": null
            },
            {
              "id": "Trojan.JS.Agent",
              "display_name": "Trojan.JS.Agent",
              "target": null
            },
            {
              "id": "APT Notes",
              "display_name": "APT Notes",
              "target": null
            },
            {
              "id": "susp.rtf.objupdate",
              "display_name": "susp.rtf.objupdate",
              "target": null
            },
            {
              "id": "RedCap.zoohz",
              "display_name": "RedCap.zoohz",
              "target": null
            },
            {
              "id": "Trojan.Tasker",
              "display_name": "Trojan.Tasker",
              "target": null
            },
            {
              "id": "virus.office.qexvmc",
              "display_name": "virus.office.qexvmc",
              "target": null
            },
            {
              "id": "Trojan.KillProc",
              "display_name": "Trojan.KillProc",
              "target": null
            },
            {
              "id": "Generic.MSIL.GrwtpStealer.1",
              "display_name": "Generic.MSIL.GrwtpStealer.1",
              "target": null
            },
            {
              "id": "Suspicious.Cloud",
              "display_name": "Suspicious.Cloud",
              "target": null
            },
            {
              "id": "PowerShell.DownLoader",
              "display_name": "PowerShell.DownLoader",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "AGEN.1030939",
              "display_name": "AGEN.1030939",
              "target": null
            },
            {
              "id": "HackTool.Binder",
              "display_name": "HackTool.Binder",
              "target": null
            },
            {
              "id": "Trojan.Inject",
              "display_name": "Trojan.Inject",
              "target": null
            },
            {
              "id": "Dldr.Agent",
              "display_name": "Dldr.Agent",
              "target": null
            },
            {
              "id": "Dropper.MSIL",
              "display_name": "Dropper.MSIL",
              "target": null
            },
            {
              "id": "Trojan.VBKryjetor",
              "display_name": "Trojan.VBKryjetor",
              "target": null
            },
            {
              "id": "PWSX",
              "display_name": "PWSX",
              "target": null
            },
            {
              "id": "VB:Trojan.VBA.Agent",
              "display_name": "VB:Trojan.VBA.Agent",
              "target": null
            },
            {
              "id": "HEUR:Trojan.MSOffice.Stratos",
              "display_name": "HEUR:Trojan.MSOffice.Stratos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1454",
              "name": "Malicious SMS Message",
              "display_name": "T1454 - Malicious SMS Message"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c5970817e6bf8b0e5b5ff",
          "export_count": 334,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1184,
            "FileHash-SHA1": 949,
            "FileHash-SHA256": 3712,
            "URL": 2925,
            "domain": 627,
            "hostname": 1319,
            "CVE": 26,
            "email": 8,
            "CIDR": 2
          },
          "indicator_count": 10752,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "20.99.186.246 [exploit source]",
        "URLhaus Abuse.ch",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "IPv4 103.224.182.246        command_and_control",
        "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians/ [heuristic]",
        "ThreatFox Abuse.ch",
        "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "114.114.114.114 [ Tulach Malware IP]",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "194.245.148.189 [CnC]",
        "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
        "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
        "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "IPv4 95.213.186.51              command_and_control",
        "Maltiverse Research Team",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "CS Sigma Rules: Disable UAC Using Registry by frack113",
        "IPv4 72.251.233.245           command_and_control",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "init.ess.apple.com [backdoor, malicious script, access via media]",
        "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "Remote Access Trojan",
        "http://ifdnzact.com/?dn=megawebdeals.com&pid=9PO755G95 [ phishing]",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "Win32:RATX-gen [Trj] identified.",
        "fp2e7a.wpc.2be4.phicdn.net",
        "IPv4 45.15.156.208            command_and_control",
        "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]",
        "Hybrid Analysis",
        "http://109.206.241.129/666bins/666.mpsl",
        "URLscan.io",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "https://www.hybrid-analysis.com/sample/63bf920be2401947bd686d7dd146af7f3e56800409307360105bf50cebb1c1ea",
        "143.244.50.213 |169.150.249.162  [malware_hosting]",
        "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "init.ess.apple.com         (malicious code script)",
        "0-173-x.msn.com | https://twitter.com/PORNO_SEXYBABES | 0-3.duckdns.org | 0-212.pornhub.org | 000web.pornhub.org",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
        "20.99.186.246 exploit source",
        "Deep Research",
        "IPv4 45.12.253.72.            command_and_control",
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "http://114.114.114.114/ipw.ps1",
        "https://stackabuse.com/assets/images/apple",
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "www2.megawebfind.com [command and control]",
        "IPv4 104.247.81.51             command_and_control",
        "Cyber Threat Coalition",
        "mailtrack.io [tracking VirusTotal graphs, link trace back]",
        "https://pin.it/ [faux Pinterest for TB]",
        "xred.mooo.com [pornhub trojan]",
        "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
        "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
        "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
        "http://watchhers.net/index.php [malware spreader]",
        "CS Sigma Rules: Shadow Copies Deletion Using Operating Systems Utilities by Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "Hostname: www.supernetforme.com      command_and_control",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
        "http://45.159.189.105/bot/regex [ tracking | botnet]",
        "nr-data.net [Apple Private Data Collection]",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "happylifehappywife.com",
        "https://downloaddevtools.ir/     (phishing)",
        "CS Sigma Rules: Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "13.107.136.8  [ Tulach Malware IP redirect]",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "https://twitter.com/sheriffspurlock?lang=en",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Password cracker | Patient being tracked through multiple medical systems]",
        "location-icloud.com",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "Doing any evil thing for mone does not compute for me.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "IPv4 63.251.106.25             command_and_control"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Lucky Mouse APT27 | NoName057(16) |  Unnamed"
          ],
          "malware_families": [
            "Script.inf",
            "Trojan.msil.injector",
            "Agen.1045227",
            "Webmonitor rat",
            "Trojandownloader:linux/downldr",
            "Trojan:linux/downldr",
            "Bladabindi.q",
            "Macro.agent",
            "Lockbit",
            "Loki password stealer (pws)",
            "Vba.downloader",
            "Delf.nbx",
            "Expiro",
            "Generic.msil.bladabindi",
            "Trojan:win32/qshell",
            "Trojan.psw.python",
            "Riskware.netfilter",
            "Trojan.notifier",
            "Trojan.cud.gen",
            "Gen:heur.ransom.msil",
            "Virus.virut",
            "Psw.agent",
            "Malicious.8c45ba",
            "Agen.1030939",
            "Constructor.msil",
            "Agen.1141126",
            "Suspicious.save",
            "Autoit.bimwt",
            "Suspected of trojan.downloader.gen",
            "Kryptik.fph.gen",
            "Application.sqlcrack",
            "Agen.1043164",
            "Backdoor.hupigon",
            "Ait.heur.cottonmouth.8.78f19bd7",
            "Malwarex",
            "Powershell.trojan",
            "Trojan.ole2.vbs",
            "Sgeneric",
            "Snh:script [dropper]",
            "Malware.heur_generic.a",
            "Fake ,promethiumm ,strongpity",
            "Hacktool",
            "Faceliker.a",
            "Dark power",
            "Behaveslike.ransom",
            "Agen.1038489",
            "Gen:variant.ser.strictor",
            "Generic.malware.smyb",
            "Black.gen2",
            "Dropper.trojan.agent",
            "Virus.office.qexvmc",
            "Unsafe",
            "Trojan.indiloadz",
            "Backdoor.androm",
            "Unsafe.ai_score_100%",
            "Redcap.zoohz",
            "Application.innovativsol",
            "Elf",
            "Powershell.downloader",
            "Gen:variant.revengerat",
            "Malicious.3e78cc",
            "Xegumumune.8596c22f",
            "Tor - s0183",
            "Il:trojan.msilzilla",
            "Quasar rat",
            "Behaveslike.exploit",
            "Injector.clds",
            "Backdoor.xtreme",
            "Apt notes",
            "Generic.msil.passwordstealer",
            "Wacatac.d6",
            "Artemis",
            "Heur:trojan.ole2.alien",
            "Malware.tk.generic",
            "Exploit.msoffice",
            "Trojan.pws",
            "Trojan.java",
            "Html_redir.smr",
            "Evo",
            "Trojan.delshad",
            "Pws-fczz",
            "Msil.trojan.bse",
            "Gen:variant.mikey",
            "Js:trojan.cryxos",
            "Heur:exploit.generic",
            "Gen:variant.zusy",
            "Constructor.msil  linux.agent",
            "Gen:variant.midie",
            "Suppobox",
            "Zpevdo.b",
            "Pua.gen",
            "Dropped:generic.ransom.dmr",
            "Gen:variant.sirefef",
            "Malicious.d800d6",
            "Agent.pwc",
            "Heur/qvm42.3.72eb.malware",
            "Troj_frs.vsntfk19",
            "Heur:trojan.msil.tasker",
            "Ransom_wcry.smalym",
            "Trojan.tasker",
            "Gen:variant.kazy",
            "Hacktool.cheatengine",
            "Presenoker",
            "Application.searchprotect",
            "Trojan.downloader.generic",
            "Gen:heur.msil.inject",
            "Heur:backdoor.msil.nanobot",
            "Gen:variant.graftor",
            "Malicious.moderate.ml",
            "Troj_gen.r002c0og518",
            "W32/hupigon.ncu",
            "Packed.netseal",
            "Heur:trojan.msoffice.sagent",
            "Trojan.malware.121218",
            "Agent.ypez",
            "Agent.aik.gen",
            "Susp.rtf.objupdate",
            "Agent.aso",
            "Trojan.ransom.generickd",
            "Trojanspy",
            "W32.trojan",
            "Relic",
            "Trojan.agent",
            "Azorult",
            "Dridex",
            "Riskware.crack",
            "Win.malware.unsafe",
            "Sdbot.caoc",
            "Adware.downware",
            "Trojan.doc.downloader",
            "Redcap.vneda",
            "Wannacryptor",
            "Trojan.msil",
            "Worm.win64.autorun",
            "Trojan.js.agent",
            "Riskware.hacktool.agent",
            "Indiloadz.bb",
            "Gen:heur.msil.androm",
            "Generic.malware",
            "Python.keylogger",
            "Malicious.f01f67",
            "$webwatson",
            "Xlm.trojan.abracadabra.27",
            "Packed.vmprotect",
            "Suspicious.cloud",
            "Juko",
            "Trojan.pws.growtopia",
            "Psw.stealer",
            "Hw32.packed",
            "W32.aidetect",
            "Trojan.wanna",
            "Vb.emodldr.4",
            "Trojan.python",
            "Lumma stealer",
            "Kryptik.noe",
            "Behavbehaveslike.pupxbi",
            "Domains",
            "Phish.ab",
            "Gen:nn.zexaf.32515",
            "Trojan.packednet",
            "Js:trojan.js.faceliker",
            "Gen:nn.zemsilf.34128",
            "Riskware",
            "Heur.msword.gen",
            "Wannacry",
            "Vb.pwshell.2",
            "Heur:remoteadmin.generic",
            "Gen:variant.ursu",
            "Injector.jdo",
            "Packed.asprotect",
            "Gen:nn.zemsilf.34062",
            "Trojan.generic",
            "Trojan.heur",
            "Trojan.androm.gen",
            "Tulach",
            "Ursnif",
            "Js:trojan.hidelink",
            "Agent.nbae",
            "Trojan.script",
            "Bscope.riskware",
            "Nemucod.a",
            "Generic.msil.limerat",
            "Trojan.malware.300983",
            "Tofsee",
            "Ransom_wcry.smj",
            "Ransom:win32/cve-2017-0147",
            "Win.malware.qshell-9875653-0",
            "Cobalt strike",
            "Skynet",
            "Bscope.trojan",
            "Generic.servstart.a",
            "Malicious.11abfc",
            "Zbd zeus",
            "Cil.heapoverride",
            "Trojan.killproc",
            "Generic.msil.grwtpstealer.1",
            "Vb:trojan.vba.agent",
            "Feodo",
            "Immortal stealer",
            "Deepscan:generic.spyagent.6",
            "Deepscan:generic.ransom.gandcrab5",
            "Heur:trojan.msoffice.alien",
            "Gen:variant.jaiko",
            "Agent.aik.gencil.stupidcryptor",
            "Trojanspy.keylogger",
            "Heur:trojan.tasker",
            "Generic.trickbot.1",
            "Dropper.binder",
            "Trojan:msil/burkina",
            "Wiper",
            "Linux.agent",
            "Hacktool.binder",
            "Gen:nn",
            "Susp.lnk",
            "Tscope.trojan",
            "Vb:trojan.valyria",
            "Trojan.pws.agent",
            "Backdoor.msil.agent",
            "Generic.asmalws",
            "Trojan:python/downldr",
            "Hack.patcher",
            "Loki bot",
            "Icefog",
            "Ransomware",
            "Trojan.html.phish",
            "Webtoolbar",
            "Virut",
            "Trojan.chapak",
            "Gamehack.nl",
            "Emotet",
            "Auslogics",
            "Program.unwanted",
            "Spyware.bobik",
            "Comspec",
            "Malicious.71b1a8",
            "Backdoor.poison",
            "W32.eheur",
            "Backdoor.rbot",
            "Trojanspy.java",
            "Win32:ratx-gen [trj]",
            "Malicious.6e0700",
            "Hoax.js.phish",
            "Blacknet rat",
            "Packed.themida.gen",
            "Riskware.agent",
            "Heur/qvm41.2.da9b.malware",
            "Malicious.high.ml",
            "Gen:trojan.heur2.lptbhw@w64.hfsautob",
            "Redline stealer",
            "Suspicious.low.ml",
            "Trojanspy.python",
            "Trojan.pornoasset",
            "Packed-gv",
            "Trojan.vba",
            "Gen:variant.johnnie",
            "Js:trojan.clicker",
            "Cil.stupidcryptor",
            "Index.php",
            "Kryptik.nrd",
            "Heur:adware.startsurf",
            "Scrinject.b",
            "Dropper.msil",
            "Trojan:win32/generic",
            "Ransom.wannacrypt",
            "Vb.emooodldr.10",
            "Redcap.rlhse",
            "Gen:variant.barys",
            "Trojan.trickster",
            "Macro.trojan.dropperd",
            "Gen:variant.msilperseus",
            "Trojan.ekstak",
            "Ml.generic",
            "Heur:trojan.linux.agent",
            "Heur.vba.trojan",
            "Script.agent",
            "Staticrr.paleokits.net",
            "Trojan.inject",
            "Possiblethreat.pallas",
            "W32.aidetectvm",
            "Js:iframe",
            "Gamehack.crs",
            "Gamehack.dom",
            "Inmortal",
            "Gen:variant.symmi",
            "Backdoor.agent",
            "Gen:heur.ransom.hiddentears",
            "Trojan:vba/downldr",
            "Ransom.win64.wacatac.oa",
            "Pua.reg1staid",
            "Risktool.phpw",
            "S-b748adc5",
            "Opensubtitles.a",
            "Trojan.starter js.iframe",
            "Downldr.gen",
            "Agen.1144657",
            "Psw.discord",
            "Qvm201.0.b70b.malware",
            "Gen:heur.noobyprotect",
            "Adware.kuzitui",
            "Filerepmalware",
            "Heur:webtoolbar.generic",
            "Deepscan:generic.ransom.amnesiae",
            "Kryptik.gucb",
            "Vb.downloader.2",
            "Trojan.autoruns.generickds",
            "Heur:trojan.msoffice.stratos",
            "Exploit.w32.agent",
            "Locky",
            "Macro.downloader.amip",
            "States",
            "Dldr.agent",
            "Wacapew.c",
            "Dangerousobject.multi",
            "Exploit cve-2017-11882",
            "Hacktool.bruteforce",
            "Vb.chronos.7",
            "Phishing.html",
            "Exploit.cve",
            "Trojan.win64",
            "Gen:variant.bulz",
            "Trickbot - s0266",
            "Virus.3dmax.script",
            "Virus.ramnit",
            "Pws.p",
            "Ransom.win64.pornoasset.sm1",
            "Injector.is.gen",
            "Blacknet",
            "Cve-2015-1650",
            "Heur.bzc.yax.pantera.10",
            "Gen:variant.cerbu",
            "Trojan.vbkryjetor",
            "Dropper.trojan.generic",
            "Html:script",
            "Pwsx",
            "Kuluoz.b.gen",
            "Adware.installmonetizer",
            "Trojan.psw.mimikatz",
            "Adload.ad81",
            "Gen:variant.razy",
            "Suspicious_gen.f47v0520",
            "Gen:variant.ulise",
            "Ramnit.n",
            "Trojan.trickbot",
            "Js:trojan.js.likejack",
            "Agenttesla",
            "Generic.bitcoinminer.3",
            "Trojan.wisdomeyes.16070401.9500",
            "Smokeloader",
            "Trojan.php.agent",
            "Msil.downloader",
            "Phish.jat",
            "Downloader.certutilurlcache",
            "Other",
            "Tsgeneric"
          ],
          "industries": [
            "Legal",
            "Healthcare",
            "Technology",
            "Government",
            "Civil society",
            "Telecommunications"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "69b95579bdc4ac1824b7ee95",
      "name": "VirusTotal report\n                    for program.exe",
      "description": "",
      "modified": "2026-04-16T13:37:13.951000",
      "created": "2026-03-17T13:22:01.672000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 101,
        "FileHash-SHA256": 114,
        "URL": 106,
        "domain": 23,
        "hostname": 66
      },
      "indicator_count": 511,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "3 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6905d40f781d7d58d4021a20",
      "name": "Treece Alfrey Musat P.C., Chris P. Ahmann  Colorado State \u2022 Tam Legal Special Cousel for egregious acts by PT.",
      "description": "- with a primary focus on criminal defense. In both positions, he successfully defended his clients against claims running the gamut of the criminal justice system, from DUI\nand misdemeanors to felony indictments. In his criminal practice, Mr. Ahmann defends clients charged with both misdemeanor and felony cases. Mr. Ahmann continues his criminal practice as he believes that his clients deserve someone on their side to assure their voice is heard in the criminal process as well. He is dedicated to each of his clients and is always\nstriving for the best possible outcome in their individual cases. Mr. Ahmann also specializes in defense of employers in workers' compensation claims. He also assists TAM clients whose liability defense touches criminal prosecution, regularly providing effective criminal counsel in catastrophic injury common carrier matters, as well as criminal prosecution stemming from\nemployment and official acts.",
      "modified": "2025-12-20T06:00:23.758000",
      "created": "2025-11-01T09:34:07.323000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8332,
        "domain": 4819,
        "hostname": 2165,
        "FileHash-SHA256": 7369,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 23637,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "120 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906c12b1dd6a64ab1beaa55",
      "name": "SpyNoon \u2022Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-02T02:25:47.431000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69137ee5d76d486d65396af0",
      "name": "Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious acts committed by Jeffrey S. Reimer DPT \u2022 Treece Alfrey Musat P.C., ",
      "description": "",
      "modified": "2025-12-01T09:02:26.881000",
      "created": "2025-11-11T18:22:29.976000",
      "tags": [
        "public tlp",
        "trojandropper",
        "other",
        "references add",
        "show",
        "provide",
        "remote",
        "t1457",
        "media content",
        "t1480",
        "subvert trust",
        "controls t1562",
        "modify tools",
        "command history",
        "ck t1027",
        "t1057",
        "discovery t1069",
        "t1071",
        "protocol t1105",
        "tool transfer",
        "t1113",
        "logging t1568",
        "t1574",
        "execution flow",
        "dll sideloading",
        "t1583",
        "ta0003",
        "ck id",
        "america",
        "att",
        "t1045",
        "capture t1140",
        "ipv4",
        "active related",
        "contact",
        "adversary",
        "tam legal",
        "qshell",
        "colorado state",
        "ahmann special",
        "counsel",
        "download",
        "ahmann",
        "university",
        "history",
        "john marshall",
        "law school",
        "special counsel",
        "christopher ahmann",
        "defense",
        "url http",
        "create new",
        "pulse provide",
        "white",
        "adversary tags",
        "add tag",
        "groups add",
        "countries add",
        "country malware",
        "trojan",
        "script urls",
        "treece alfrey",
        "meta",
        "function",
        "for privacy",
        "germany unknown",
        "united",
        "script",
        "ip address",
        "creation date",
        "date",
        "tracker",
        "null",
        "window",
        "general full",
        "reverse dns",
        "server",
        "philadelphia",
        "asn8560",
        "ionosas",
        "ionos",
        "fasthosts",
        "media",
        "telecom",
        "apache",
        "main",
        "gtagtracker",
        "gatracker",
        "brian  sabey",
        "hall render",
        "fastly error",
        "palantir",
        "special counsel",
        "gravity rat"
      ],
      "references": [
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://45.159.189.105/bot/regex \u2022\u2019 Fake Pinterest \u2022https://pin.it/",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "Tsara never knew defense attorney fought & closed her worker\u2019s compensation claim",
        "Traceback- Man with signal jammer/ deauther working around her today.",
        "Absolutely zero regard for the victims who facilitate your luxury lifestyle.",
        "Do you slap luxury cologne on your undeserving face paid for by money workers suffered for?",
        "You\u2019d kill to have someone else\u2019s lifestyle? May God take you out!",
        "This God smacked penguin ordered a settlement hearing with less than 24 hours notice for claimant.",
        "He began a smear campaign immediately and is directly linked to Hall Render and Palantir",
        "Doing any evil thing for mone does not compute for me.",
        "I\u2019ve looked through the settlement docs,  injuries caused by Jeffrey Scott Reiner DPT omitted.",
        "He must be very scary like Peter Theil because every attorney took case then backed off.",
        "Patiently waiting to see what God is going to do to all of you. You take lives for $",
        "Stop! A woman was assaulted carved up, lived with a swollen brain , maltreatment , stalkers , hitmen?",
        "So you can order food at fine restaurants , go to the finest places and get the best seats?  No. I am earnestly praying Jehovah Sabaoth takes your last breath from all of you with  Yawehs mightiest angels leading the way with a changing of guard for every  tattle you will lose",
        "On same block with HalkRender. Has close working relationship. All Palantir legal enities"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Other",
          "display_name": "Other",
          "target": null
        },
        {
          "id": "Win.Malware.Unsafe",
          "display_name": "Win.Malware.Unsafe",
          "target": null
        },
        {
          "id": "Juko",
          "display_name": "Juko",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        },
        {
          "id": "Trojan:Win32/Generic",
          "display_name": "Trojan:Win32/Generic",
          "target": "/malware/Trojan:Win32/Generic"
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qshell",
          "display_name": "Trojan:Win32/Qshell",
          "target": "/malware/Trojan:Win32/Qshell"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Healthcare",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": "6905d40f781d7d58d4021a20",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7556,
        "domain": 4779,
        "hostname": 2053,
        "FileHash-SHA256": 7233,
        "FileHash-MD5": 474,
        "FileHash-SHA1": 470,
        "CVE": 4,
        "email": 4
      },
      "indicator_count": 22573,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "139 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c3bd803f15cd94aab6e287",
      "name": "Lumma Stealer | Colorado Medical Center HCA",
      "description": "Needs further investigation. Miscellaneous attack affecting Denver physicians directory. Visitors accessing the page using insecure devices may be affected. PII & PHI breached. Monitoring.",
      "modified": "2024-03-08T17:04:03.644000",
      "created": "2024-02-07T17:27:28.349000",
      "tags": [
        "whois record",
        "ssl certificate",
        "contacted",
        "historical ssl",
        "referrer",
        "execution",
        "resolutions",
        "problems",
        "siblings domain",
        "whois whois",
        "startpage",
        "httponly",
        "samesitenone",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "language",
        "html document",
        "unicode text",
        "utf8 text",
        "doctype",
        "anchor hrefs",
        "hrefs",
        "denver",
        "tsara brashears",
        "apple ios",
        "password bypass",
        "apple phone",
        "unlocker",
        "shell code",
        "script",
        "contacted urls",
        "hacktool",
        "malicious",
        "download",
        "malware",
        "relic",
        "monitoring",
        "domains",
        "eurodns sa",
        "markmonitor",
        "ip detections",
        "country",
        "graph",
        "https",
        "mitre att",
        "ta0007 network",
        "t1046 sends",
        "ssdp",
        "command",
        "control ta0011",
        "protocol t1071",
        "performs dns",
        "layer protocol",
        "number",
        "cus cndigicert",
        "ja3s",
        "subject",
        "sha2 secure",
        "server ca",
        "odigicert inc",
        "cus cnmicrosoft",
        "algorithm",
        "memory pattern",
        "file system",
        "registry",
        "registry keys",
        "process",
        "created",
        "processes tree",
        "february",
        "healthone",
        "gmbh version",
        "status page",
        "service privacy",
        "legal",
        "impressum",
        "url https",
        "reverse dns",
        "general full",
        "security tls",
        "protocol h2",
        "software",
        "frankfurt",
        "main",
        "germany",
        "resource hash",
        "de indicators",
        "hashes",
        "value",
        "scriptsrcelem",
        "variables",
        "boomrmq string",
        "boomrapikey",
        "boomr function",
        "system",
        "babelpolyfill",
        "assign function",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "aes256gcm",
        "level",
        "akamaiasn1",
        "europeberlin",
        "generic malware",
        "tag count",
        "tue dec",
        "threat report",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "root ca",
        "pattern match",
        "authority",
        "span",
        "presbyterianst",
        "luke",
        "medical center",
        "class",
        "accept",
        "date",
        "refresh",
        "blood",
        "liver cancer",
        "breast cancer",
        "lung cancer",
        "kidney cancer",
        "skin cancer",
        "sarcoma",
        "prostate cancer",
        "body",
        "facebook",
        "twitter",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "cookie",
        "command and control",
        "mitre",
        "scanning host",
        "exploit source",
        "trojan",
        "callback function",
        "targets",
        "targeting",
        "samesite=none",
        "kde",
        "konqueror",
        "phi",
        "pii",
        "wTJh.exe",
        "malware ransom trojan evader rat",
        "network",
        "rat trojan",
        "relacionada",
        "critical risk",
        "cyberstalking",
        "elf collection",
        "matches rule",
        "emotet",
        "lockbit",
        "critical",
        "copy",
        "installer",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "ursnif",
        "core",
        "as55688 pt",
        "passive dns",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "asn as55688",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "united",
        "aaaa",
        "unknown",
        "a domains",
        "search",
        "creation date",
        "record value",
        "next",
        "pornhub",
        "anyxxxtube",
        "domain",
        "gandi sas",
        "hostname",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "pe32 packer",
        "petite",
        "vs98",
        "info compiler",
        "products",
        "header intel",
        "name md5",
        "type",
        "rticon neutral",
        "overlay",
        "dos exe",
        "threat roundup",
        "pe resource",
        "june",
        "lumma stealer",
        "ransomexx",
        "azorult",
        "njrat",
        "open",
        "problem",
        "plugx",
        "android",
        "sex_phot.jpg.exe",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "delphi generic",
        "icons library",
        "pe32 linker",
        "lcc linker",
        "empty hash",
        "tulach",
        "sabey",
        "rat",
        "remote",
        "remote access trojan"
      ],
      "references": [
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians",
        "https://www.hybrid-analysis.com/sample/63bf920be2401947bd686d7dd146af7f3e56800409307360105bf50cebb1c1ea",
        "www2.megawebfind.com [command and control]",
        "http://ifdnzact.com/?dn=megawebdeals.com&pid=9PO755G95 [ phishing]",
        "20.99.186.246 [exploit source]",
        "https://www.healthonecares.com/locations/presbyterian-st-lukes-medical-center/physicians/ [heuristic]",
        "Win32:RATX-gen [Trj] identified.",
        "CS Sigma Rules: Shadow Copies Deletion Using Operating Systems Utilities by Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)",
        "CS Sigma Rules: Disable UAC Using Registry by frack113",
        "http://45.159.189.105/bot/regex [ tracking | botnet]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Password cracker | Patient being tracked through multiple medical systems]",
        "0-173-x.msn.com | https://twitter.com/PORNO_SEXYBABES | 0-3.duckdns.org | 0-212.pornhub.org | 000web.pornhub.org",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "CS Sigma Rules: Wow6432Node CurrentVersion Autorun Keys Modification by Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)",
        "Remote Access Trojan"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Indonesia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "Win32:RATX-gen [Trj]",
          "display_name": "Win32:RATX-gen [Trj]",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "W32/Hupigon.NCU",
          "display_name": "W32/Hupigon.NCU",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "Wiper",
          "display_name": "Wiper",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 68,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 883,
        "URL": 1412,
        "FileHash-MD5": 283,
        "FileHash-SHA1": 231,
        "FileHash-SHA256": 2909,
        "domain": 824,
        "email": 3,
        "CVE": 3
      },
      "indicator_count": 6548,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "772 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65944a8149f2479b2fbc6cd1",
      "name": "Relic",
      "description": "Malicious redirect to BotNet malvertizing of a business affecting both .command YouTube distribution. YouTube encoded logins. Hacker attack, geo tracking, passwords crack, decryption, C2. Retaliation. Found in referenced Twitter link shared  with me.",
      "modified": "2024-02-01T14:01:46.735000",
      "created": "2024-01-02T17:40:17.890000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers nel",
        "maxage5184000",
        "name verdict",
        "falcon sandbox",
        "whois record",
        "ssl certificate",
        "tsara brashears",
        "whois whois",
        "historical ssl",
        "contacted",
        "highly targeted",
        "hackers",
        "botnet",
        "apple ios",
        "malicious",
        "hacktool",
        "quasar",
        "download",
        "malware",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "getprocaddress",
        "indicator",
        "prefetch8",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "united",
        "file",
        "pattern match",
        "path",
        "date",
        "win64",
        "factory",
        "model",
        "comspec",
        "hybrid",
        "general",
        "click",
        "strings",
        "patch",
        "song culture",
        "tulach"
      ],
      "references": [
        "rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru [phishing] SongCulture.comm& YouTube redirected by hacker",
        "https://hybrid-analysis.com/sample/3f1b1621818b3cfef7c58d8c3e382932a5a817579dffe8fbefc4cf6fdb8fc21d",
        "https://www.virustotal.com/gui/url/4657cd9117ad26288f2af98767de164d9af64e9c22e3eda9580766688ec38652/community",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/,",
        "https://twitter.com/sheriffspurlock?lang=en",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "http://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru",
        "nr-data.net [Apple Private Data Collection]",
        "init.ess.apple.com [backdoor, malicious script, access via media]",
        "https://stackabuse.com/assets/images/apple",
        "https://apple.find-tracking.us/?id=jit./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./error./err",
        "location-icloud.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking| Botnet Campaign]",
        "mailtrack.io [tracking VirusTotal graphs, link trace back]",
        "http://rawlucky.com/submit/prizepicker/iq?devicemodel=iPhone&carrier=\u00aeion=Baghdad&brand=Apple&browser=AlohaBrowserMobile&prize=300k&u=track.bawiwia.com&isp=EarthlinkTelecommunicationsEquipmentTradingServicesDmcc&ts=29900ce7-726c-4c9f-b0c3-21ff2f859648&country=IQ&click_id=woot0oed65crk85u2oe4vubu&partner=2423996&skip=yes",
        "https://aheadofthegame.uk/about?utm_campaign=You%E2%80%99re%20nearly%20there!&utm_medium=email&utm_source=Eloqua&elqTrackId=e6385dd142e445f48aa17b4544780841&elq=0db2557254194121b23f3bec84f42097&elqaid=4059&elqat=1&elqCampaignId=",
        "https://pin.it/ [faux Pinterest for TB]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS Password Cracker [",
        "114.114.114.114 [ Tulach Malware IP]",
        "13.107.136.8  [ Tulach Malware IP redirect]",
        "http://114.114.114.114:9421/proxycontrolwarn/ [Tulach cnc | probe]",
        "http://114.114.114.114/d?dn=sinastorage.com [ storage of targeted individuals on and offline Behavior]",
        "http://114.114.114.114:7777/c/msdownload/update/others/2022/01/29136388_",
        "http://114.114.114.114/ipw.ps1",
        "194.245.148.189 [CnC]",
        "https://stackabuse.com/generating-command-line-interfaces-cli-with-fire-in-python/",
        "http://109.206.241.129/666bins/666.mpsl",
        "http://designspaceblog.com/?mystique=jquery_init&ver=2.4.2",
        "143.244.50.213 |169.150.249.162  [malware_hosting]",
        "http://watchhers.net/index.php [malware spreader]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian No Expiration\t0\t  Domain twitter.com No Expiration\t0\t  Hostname www.pornhub.com No Expiration\t0\t  URL https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 No Expiration\t0\t  URL",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "xred.mooo.com [pornhub trojan]",
        "https://twitter.com/PORNO_SEXYBABES [ malvertizing, contextualizing, malicious]",
        "http://45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=DESKTOP-B0T93D6\\george",
        "https://otx.alienvault.com/indicator/url/https://www.hostinger.com/?REFERRALCODE=1ROCKY77 [ DGA parking]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "Comspec",
          "display_name": "Comspec",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8049,
        "FileHash-MD5": 388,
        "FileHash-SHA1": 212,
        "FileHash-SHA256": 7062,
        "domain": 4401,
        "hostname": 2653,
        "CVE": 2,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 22769,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "808 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c5970817e6bf8b0e5b5ff",
      "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
      "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
      "modified": "2023-12-09T03:01:57.989000",
      "created": "2023-11-09T04:00:48.087000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "communicating",
        "contacted",
        "resolutions",
        "whois record",
        "whois whois",
        "whois parent",
        "whois siblings",
        "skynet",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "million",
        "team",
        "microsoft",
        "back",
        "download",
        "phishing",
        "union",
        "bank",
        "malicious site",
        "blacklist http",
        "exit",
        "traffic",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "spammer",
        "malware",
        "dropped",
        "unlocker",
        "http",
        "critical risk",
        "redline stealer",
        "core",
        "hacktool",
        "execution",
        "type win32",
        "exe size",
        "first seen",
        "file name",
        "avast win32",
        "win32",
        "avg win32",
        "fortinet",
        "vitro",
        "mb first",
        "rmndrp",
        "clean mx",
        "undetected dns8",
        "undetected vx",
        "sophos",
        "vault",
        "zdb zeus",
        "cmc threat",
        "snort ip",
        "feodo tracker",
        "cybereason",
        "send bug",
        "pe yandex",
        "no data",
        "tag count",
        "count blacklist",
        "tag tag",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "first",
        "seen",
        "valid",
        "no na",
        "no no",
        "ip security",
        "cndst root",
        "ca x3",
        "ca id",
        "research group",
        "cnisrg root",
        "no expired",
        "mozilla",
        "android",
        "malicious red team",
        "tsara brashears",
        "cyber stalking",
        "malvertizing",
        "invasion of privacy",
        "threat",
        "adult content",
        "apple",
        "iphone unlocker",
        "android",
        "exploited spyware",
        "malware host",
        "brute force",
        "revenge-rat",
        "banker",
        "evasive",
        "domain",
        "redline",
        "stealer",
        "phishing",
        "ramnit",
        "unreliable subdomains",
        "dridex",
        "gating",
        "msil",
        "rat",
        "loki",
        "network",
        "hacking",
        "sinkhole",
        "azorult",
        "c2",
        "historicalandnew",
        "targeted attack",
        "puffstealer",
        "rultazo",
        "lokibot",
        "loki pws",
        "burkina",
        "banker,dde,dridex,exploit",
        "banker,dridex,evasive",
        "trickbot",
        "ransomware,torrentlocker",
        "exploit_source",
        "blacknet",
        "FileRepMalware",
        "linux agent",
        "blacknet",
        "ios",
        "phishing paypal",
        "tagging",
        "defacement",
        "hit",
        "bounty",
        "phishing site",
        "malware site",
        "malware download",
        "endangerment",
        "Malicious domain - SANS Internet Storm Center",
        "evasive,msil,rat,revenge-rat",
        "prism_setting",
        "prism_object",
        "static engine",
        "social engineering",
        "jansky",
        "worm",
        "network rat",
        "networm",
        "Loki Password Stealer (PWS)",
        "South Carolina Federal Credit Union phishing",
        "darkweb",
        "yandex",
        "redirectors",
        "blacknet threats",
        "phishing,ransomware,sinkhole",
        "wanacrypt0r,wannacry,wcry",
        "tor c++",
        "tor c++ client",
        "python user",
        "js user",
        "hacker",
        "hijacker",
        "heur",
        "maltiverse",
        "alexa top",
        "exploit",
        "riskware",
        "unsafe",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de indicators",
        "domains",
        "hashes",
        "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
        "malicious url",
        "financial",
        "blacknet rat",
        "azorult",
        "stealer",
        "deep scan",
        "blacklist https",
        "referrer",
        "collections kp",
        "incident ip",
        "sneaky server",
        "replacement",
        "unauthorized",
        "emotet",
        "noname057",
        "generic malware",
        "engineering",
        "cyber threat",
        "facebook",
        "paypal",
        "dropbox",
        "united",
        "america",
        "banking",
        "wells fargo",
        "steam",
        "twitter",
        "sliver",
        "daum",
        "swift",
        "runescape",
        "betabot",
        "district",
        "iframe",
        "alexa",
        "downldr",
        "agent",
        "presenoker",
        "bladabindi",
        "live",
        "conduit",
        "pony",
        "covid19",
        "malicious",
        "cobalt strike",
        "suppobox",
        "ramnit",
        "meterpreter",
        "virut",
        "njrat",
        "pykspa",
        "asyncrat",
        "downloader",
        "fakealert",
        "binder",
        "virustotal",
        "formbook",
        "necurs",
        "trojan",
        "msil",
        "hiloti",
        "vawtrak",
        "simda",
        "kraken",
        "solimba",
        "icedid",
        "redirector",
        "suspic",
        "amadey",
        "raccoon",
        "nanocore rat",
        "revenge rat",
        "genkryptik",
        "fuery",
        "wacatac",
        "service",
        "cloudeye",
        "tinba",
        "domaiq",
        "ave maria",
        "zeus",
        "ransomware",
        "zbot",
        "generic",
        "trojanspy",
        "states",
        "inmortal",
        "locky",
        "strike",
        "china cobalt",
        "keybase",
        "cutwail",
        "citadel",
        "radamant",
        "kovter",
        "bradesco",
        "nymaim",
        "amonetize",
        "bondat",
        "ghost rat",
        "vjw0rm",
        "bandoo",
        "matsnu",
        "dnspionage",
        "darkgate",
        "vidar",
        "keylogger",
        "remcos",
        "agenttesla",
        "detplock",
        "win64",
        "smokeloader",
        "agent tesla",
        "kgs0",
        "kls0",
        "urls",
        "type name",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "drpsuinstaller",
        "vdfsurfs",
        "opera",
        "icwrmind",
        "notepad",
        "installer",
        "miner",
        "unknown",
        "networm",
        "houdini",
        "quasar rat",
        "gamehack",
        "dbatloader",
        "qakbot",
        "ursnif",
        "CVE-2005-1790",
        "CVE-2009-3672",
        "CVE-2010-3962",
        "CVE-2012-3993",
        "CVE-2014-6332",
        "CVE-2017-11882",
        "CVE-2020-0601",
        "CVE-2020-0674",
        "hallrender.com",
        "brian sabey",
        "insurance",
        "botnetwork",
        "botmaster",
        "command_and_control",
        "CVE-2021-27065",
        "CVE-2021-40444",
        "CVE-2023-4966",
        "CVE-2017-0199",
        "CVE-2018-4893",
        "CVE-2010-3333",
        "CVE-2015-1641",
        "CVE-2017-0147",
        "CVE-2017-8570",
        "CVE-2018-0802",
        "CVE-2018-8373",
        "CVE-2017-8759",
        "CVE-2018-8453",
        "CVE-2014-3153",
        "CVE-2015-1650",
        "CVE-2017-0143",
        "CVE-2017-8464",
        "Icefog",
        "Delf.NBX",
        "$WebWatson",
        "Gen:Heur.Ransom.HiddenTears",
        "mobilekey.pw",
        "bitbucket.org",
        "Anomalous.100%",
        "malware distribution site",
        "gootkit",
        "edsaid",
        "rightsaided",
        "betabot",
        "cobaltstrike4.tk",
        "mas.to",
        "BehavesLike.YahLover",
        "srdvd16010404",
        "languageenu",
        "buildno",
        "channelisales",
        "vendorname2581",
        "osregion",
        "device",
        "systemlocale",
        "majorver16",
        "quasar",
        "find",
        "lockbit",
        "chaos",
        "ransomexx",
        "grandoreiro",
        "evilnum",
        "banker"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "20.99.186.246 exploit source",
        "fp2e7a.wpc.2be4.phicdn.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "init.ess.apple.com         (malicious code script)",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "IPv4 45.12.253.72.            command_and_control",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "IPv4 95.213.186.51              command_and_control",
        "Hostname: www.supernetforme.com      command_and_control",
        "IPv4 103.224.182.246        command_and_control",
        "IPv4 72.251.233.245           command_and_control",
        "IPv4 63.251.106.25             command_and_control",
        "IPv4 45.15.156.208            command_and_control",
        "IPv4 104.247.81.51             command_and_control",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "https://downloaddevtools.ir/     (phishing)",
        "happylifehappywife.com",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "Maltiverse Research Team",
        "URLscan.io",
        "Deep Research",
        "Hybrid Analysis",
        "URLhaus Abuse.ch",
        "Cyber Threat Coalition",
        "ThreatFox Abuse.ch"
      ],
      "public": 1,
      "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
      "targeted_countries": [
        "United States of America",
        "France",
        "Spain"
      ],
      "malware_families": [
        {
          "id": "Feodo",
          "display_name": "Feodo",
          "target": null
        },
        {
          "id": "Dridex",
          "display_name": "Dridex",
          "target": null
        },
        {
          "id": "Redline Stealer",
          "display_name": "Redline Stealer",
          "target": null
        },
        {
          "id": "Ramnit.N",
          "display_name": "Ramnit.N",
          "target": null
        },
        {
          "id": "Loki Bot",
          "display_name": "Loki Bot",
          "target": null
        },
        {
          "id": "Loki Password Stealer (PWS)",
          "display_name": "Loki Password Stealer (PWS)",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Zbd Zeus",
          "display_name": "Zbd Zeus",
          "target": null
        },
        {
          "id": "Trojan:MSIL/Burkina",
          "display_name": "Trojan:MSIL/Burkina",
          "target": "/malware/Trojan:MSIL/Burkina"
        },
        {
          "id": "Generic.TrickBot.1",
          "display_name": "Generic.TrickBot.1",
          "target": null
        },
        {
          "id": "Exploit.CVE",
          "display_name": "Exploit.CVE",
          "target": null
        },
        {
          "id": "Injector.IS.gen",
          "display_name": "Injector.IS.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Razy",
          "display_name": "Gen:Variant.Razy",
          "target": null
        },
        {
          "id": "Trojan.Androm.Gen",
          "display_name": "Trojan.Androm.Gen",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Linux.Agent",
          "display_name": "HEUR:Trojan.Linux.Agent",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "VBA.Downloader",
          "display_name": "VBA.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Notifier",
          "display_name": "Trojan.Notifier",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Alien",
          "display_name": "HEUR:Trojan.MSOffice.Alien",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_100%",
          "display_name": "Unsafe.AI_Score_100%",
          "target": null
        },
        {
          "id": "Gen:Variant.Johnnie",
          "display_name": "Gen:Variant.Johnnie",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan:Python/Downldr",
          "display_name": "Trojan:Python/Downldr",
          "target": "/malware/Trojan:Python/Downldr"
        },
        {
          "id": "Trojan:Linux/Downldr",
          "display_name": "Trojan:Linux/Downldr",
          "target": "/malware/Trojan:Linux/Downldr"
        },
        {
          "id": "Trojan:VBA/Downldr",
          "display_name": "Trojan:VBA/Downldr",
          "target": "/malware/Trojan:VBA/Downldr"
        },
        {
          "id": "TrojanDownloader:Linux/Downldr",
          "display_name": "TrojanDownloader:Linux/Downldr",
          "target": "/malware/TrojanDownloader:Linux/Downldr"
        },
        {
          "id": "Kryptik.FPH.gen",
          "display_name": "Kryptik.FPH.gen",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Phish.JAT",
          "display_name": "Phish.JAT",
          "target": null
        },
        {
          "id": "Phishing.HTML",
          "display_name": "Phishing.HTML",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "Phish.AB",
          "display_name": "Phish.AB",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "ml.Generic",
          "display_name": "ml.Generic",
          "target": null
        },
        {
          "id": "Xegumumune.8596c22f",
          "display_name": "Xegumumune.8596c22f",
          "target": null
        },
        {
          "id": "Generic.Malware.SMYB",
          "display_name": "Generic.Malware.SMYB",
          "target": null
        },
        {
          "id": "malicious.moderate.ml",
          "display_name": "malicious.moderate.ml",
          "target": null
        },
        {
          "id": "Agent.NBAE",
          "display_name": "Agent.NBAE",
          "target": null
        },
        {
          "id": "AGEN.1045227",
          "display_name": "AGEN.1045227",
          "target": null
        },
        {
          "id": "Riskware.Agent",
          "display_name": "Riskware.Agent",
          "target": null
        },
        {
          "id": "Gen:Variant.Cerbu",
          "display_name": "Gen:Variant.Cerbu",
          "target": null
        },
        {
          "id": "IL:Trojan.MSILZilla",
          "display_name": "IL:Trojan.MSILZilla",
          "target": null
        },
        {
          "id": "Dropped:Generic.Ransom.DMR",
          "display_name": "Dropped:Generic.Ransom.DMR",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Trojan.Heur",
          "display_name": "Trojan.Heur",
          "target": null
        },
        {
          "id": "Trojan.Malware.300983",
          "display_name": "Trojan.Malware.300983",
          "target": null
        },
        {
          "id": "SdBot.CAOC",
          "display_name": "SdBot.CAOC",
          "target": null
        },
        {
          "id": "Trojan.DelShad",
          "display_name": "Trojan.DelShad",
          "target": null
        },
        {
          "id": "Exploit CVE-2017-11882",
          "display_name": "Exploit CVE-2017-11882",
          "target": null
        },
        {
          "id": "GameHack.NL",
          "display_name": "GameHack.NL",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink",
          "display_name": "JS:Trojan.HideLink",
          "target": null
        },
        {
          "id": "Script.Agent",
          "display_name": "Script.Agent",
          "target": null
        },
        {
          "id": "Macro.Agent",
          "display_name": "Macro.Agent",
          "target": null
        },
        {
          "id": "Macro.Downloader.AMIP",
          "display_name": "Macro.Downloader.AMIP",
          "target": null
        },
        {
          "id": "Trojan.VBA",
          "display_name": "Trojan.VBA",
          "target": null
        },
        {
          "id": "HEUR.VBA.Trojan",
          "display_name": "HEUR.VBA.Trojan",
          "target": null
        },
        {
          "id": "VB.EmoooDldr.10",
          "display_name": "VB.EmoooDldr.10",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Packed-GV",
          "display_name": "Packed-GV",
          "target": null
        },
        {
          "id": "Adware.InstallMonetizer",
          "display_name": "Adware.InstallMonetizer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Zpevdo.B",
          "display_name": "Zpevdo.B",
          "target": null
        },
        {
          "id": "Presenoker",
          "display_name": "Presenoker",
          "target": null
        },
        {
          "id": "SGeneric",
          "display_name": "SGeneric",
          "target": null
        },
        {
          "id": "GameHack.DOM",
          "display_name": "GameHack.DOM",
          "target": null
        },
        {
          "id": "BehavesLike.Ransom",
          "display_name": "BehavesLike.Ransom",
          "target": null
        },
        {
          "id": "CIL.StupidCryptor",
          "display_name": "CIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.MSIL",
          "display_name": "Gen:Heur.Ransom.MSIL",
          "target": null
        },
        {
          "id": "Black.Gen2",
          "display_name": "Black.Gen2",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Trojan.HTML.PHISH",
          "display_name": "Trojan.HTML.PHISH",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Program.Unwanted",
          "display_name": "Program.Unwanted",
          "target": null
        },
        {
          "id": "HEUR/QVM42.3.72EB.Malware",
          "display_name": "HEUR/QVM42.3.72EB.Malware",
          "target": null
        },
        {
          "id": "suspicious.low.ml",
          "display_name": "suspicious.low.ml",
          "target": null
        },
        {
          "id": "JS:Trojan.Cryxos",
          "display_name": "JS:Trojan.Cryxos",
          "target": null
        },
        {
          "id": "Suspicious_GEN.F47V0520",
          "display_name": "Suspicious_GEN.F47V0520",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Generic",
          "display_name": "Dropper.Trojan.Generic",
          "target": null
        },
        {
          "id": "Trojan.TrickBot",
          "display_name": "Trojan.TrickBot",
          "target": null
        },
        {
          "id": "Malware.Tk.Generic",
          "display_name": "Malware.Tk.Generic",
          "target": null
        },
        {
          "id": "TrojanSpy.Java",
          "display_name": "TrojanSpy.Java",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "BehavesLike.Exploit",
          "display_name": "BehavesLike.Exploit",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34128",
          "display_name": "Gen:NN.ZemsilF.34128",
          "target": null
        },
        {
          "id": "Wacapew.C",
          "display_name": "Wacapew.C",
          "target": null
        },
        {
          "id": "Trojan.Malware.121218",
          "display_name": "Trojan.Malware.121218",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Trojan.Generic",
          "display_name": "Trojan.Generic",
          "target": null
        },
        {
          "id": "W32.Trojan",
          "display_name": "W32.Trojan",
          "target": null
        },
        {
          "id": "BScope.Riskware",
          "display_name": "BScope.Riskware",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147",
          "display_name": "Ransom:Win32/CVE-2017-0147",
          "target": "/malware/Ransom:Win32/CVE-2017-0147"
        },
        {
          "id": "Virus.Ramnit",
          "display_name": "Virus.Ramnit",
          "target": null
        },
        {
          "id": "Virus.Virut",
          "display_name": "Virus.Virut",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "AGEN.1141126",
          "display_name": "AGEN.1141126",
          "target": null
        },
        {
          "id": "W32.AIDetect",
          "display_name": "W32.AIDetect",
          "target": null
        },
        {
          "id": "Trojan.Python",
          "display_name": "Trojan.Python",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "Suspicious.Save",
          "display_name": "Suspicious.Save",
          "target": null
        },
        {
          "id": "Adware.Downware",
          "display_name": "Adware.Downware",
          "target": null
        },
        {
          "id": "Ransom.Win64.Wacatac.oa",
          "display_name": "Ransom.Win64.Wacatac.oa",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Gen:Variant.Midie",
          "display_name": "Gen:Variant.Midie",
          "target": null
        },
        {
          "id": "HEUR/QVM41.2.DA9B.Malware",
          "display_name": "HEUR/QVM41.2.DA9B.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Sirefef",
          "display_name": "Gen:Variant.Sirefef",
          "target": null
        },
        {
          "id": "Macro.Trojan.Dropperd",
          "display_name": "Macro.Trojan.Dropperd",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "Redcap.rlhse",
          "display_name": "Redcap.rlhse",
          "target": null
        },
        {
          "id": "Trojan.Trickster",
          "display_name": "Trojan.Trickster",
          "target": null
        },
        {
          "id": "HTML_REDIR.SMR",
          "display_name": "HTML_REDIR.SMR",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Hoax.JS.Phish",
          "display_name": "Hoax.JS.Phish",
          "target": null
        },
        {
          "id": "JS:Iframe",
          "display_name": "JS:Iframe",
          "target": null
        },
        {
          "id": "Application.SQLCrack",
          "display_name": "Application.SQLCrack",
          "target": null
        },
        {
          "id": "susp.lnk",
          "display_name": "susp.lnk",
          "target": null
        },
        {
          "id": "QVM201.0.B70B.Malware",
          "display_name": "QVM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebMonitor RAT",
          "display_name": "WebMonitor RAT",
          "target": null
        },
        {
          "id": "Tor - S0183",
          "display_name": "Tor - S0183",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCryptor",
          "display_name": "WannaCryptor",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.GandCrab5",
          "display_name": "DeepScan:Generic.Ransom.GandCrab5",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.32515",
          "display_name": "Gen:NN.ZexaF.32515",
          "target": null
        },
        {
          "id": "FileRepMalware",
          "display_name": "FileRepMalware",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILPerseus",
          "display_name": "Gen:Variant.MSILPerseus",
          "target": null
        },
        {
          "id": "Icefog",
          "display_name": "Icefog",
          "target": null
        },
        {
          "id": "$WebWatson",
          "display_name": "$WebWatson",
          "target": null
        },
        {
          "id": "Agent.AIK.gen",
          "display_name": "Agent.AIK.gen",
          "target": null
        },
        {
          "id": "Agent.AIK.genCIL.StupidCryptor",
          "display_name": "Agent.AIK.genCIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Agent.YPEZ",
          "display_name": "Agent.YPEZ",
          "target": null
        },
        {
          "id": "Application.InnovativSol",
          "display_name": "Application.InnovativSol",
          "target": null
        },
        {
          "id": "Agent.ASO",
          "display_name": "Agent.ASO",
          "target": null
        },
        {
          "id": "S-b748adc5",
          "display_name": "S-b748adc5",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "Kryptik.GUCB",
          "display_name": "Kryptik.GUCB",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Autoit.bimwt",
          "display_name": "Autoit.bimwt",
          "target": null
        },
        {
          "id": "HEUR:Trojan.OLE2.Alien",
          "display_name": "HEUR:Trojan.OLE2.Alien",
          "target": null
        },
        {
          "id": "AGEN.1038489",
          "display_name": "AGEN.1038489",
          "target": null
        },
        {
          "id": "Gen:Variant.Ser.Strictor",
          "display_name": "Gen:Variant.Ser.Strictor",
          "target": null
        },
        {
          "id": "Packed.Themida.Gen",
          "display_name": "Packed.Themida.Gen",
          "target": null
        },
        {
          "id": "AGEN.1043164",
          "display_name": "AGEN.1043164",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.PornoAsset",
          "display_name": "Trojan.PornoAsset",
          "target": null
        },
        {
          "id": "Ransom.Win64.PORNOASSET.SM1",
          "display_name": "Ransom.Win64.PORNOASSET.SM1",
          "target": null
        },
        {
          "id": "Gen:Variant.Ulise",
          "display_name": "Gen:Variant.Ulise",
          "target": null
        },
        {
          "id": "Trojan.Win64",
          "display_name": "Trojan.Win64",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Pantera.10",
          "display_name": "Heur.BZC.YAX.Pantera.10",
          "target": null
        },
        {
          "id": "malicious.high.ml",
          "display_name": "malicious.high.ml",
          "target": null
        },
        {
          "id": "CVE-2015-1650",
          "display_name": "CVE-2015-1650",
          "target": null
        },
        {
          "id": "Worm.Win64.AutoRun",
          "display_name": "Worm.Win64.AutoRun",
          "target": null
        },
        {
          "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "Pua.Gen",
          "display_name": "Pua.Gen",
          "target": null
        },
        {
          "id": "Trojan.Downloader.Generic",
          "display_name": "Trojan.Downloader.Generic",
          "target": null
        },
        {
          "id": "Suspected of Trojan.Downloader.gen",
          "display_name": "Suspected of Trojan.Downloader.gen",
          "target": null
        },
        {
          "id": "HEUR:RemoteAdmin.Generic",
          "display_name": "HEUR:RemoteAdmin.Generic",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.HiddenTears",
          "display_name": "Gen:Heur.Ransom.HiddenTears",
          "target": null
        },
        {
          "id": "Nemucod.A",
          "display_name": "Nemucod.A",
          "target": null
        },
        {
          "id": "Backdoor.Hupigon",
          "display_name": "Backdoor.Hupigon",
          "target": null
        },
        {
          "id": "Trojan.Starter JS.Iframe",
          "display_name": "Trojan.Starter JS.Iframe",
          "target": null
        },
        {
          "id": "fake ,promethiumm ,strongpity",
          "display_name": "fake ,promethiumm ,strongpity",
          "target": null
        },
        {
          "id": "PUA.Reg1staid",
          "display_name": "PUA.Reg1staid",
          "target": null
        },
        {
          "id": "Malware.Heur_Generic.A",
          "display_name": "Malware.Heur_Generic.A",
          "target": null
        },
        {
          "id": "Bladabindi.Q",
          "display_name": "Bladabindi.Q",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "malicious.6e0700",
          "display_name": "malicious.6e0700",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "RedCap.vneda",
          "display_name": "RedCap.vneda",
          "target": null
        },
        {
          "id": "Trojan.Indiloadz",
          "display_name": "Trojan.Indiloadz",
          "target": null
        },
        {
          "id": "Trojan.Ekstak",
          "display_name": "Trojan.Ekstak",
          "target": null
        },
        {
          "id": "staticrr.paleokits.net",
          "display_name": "staticrr.paleokits.net",
          "target": null
        },
        {
          "id": "MSIL.Downloader",
          "display_name": "MSIL.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Autoruns.GenericKDS",
          "display_name": "Trojan.Autoruns.GenericKDS",
          "target": null
        },
        {
          "id": "MSIL.Trojan.BSE",
          "display_name": "MSIL.Trojan.BSE",
          "target": null
        },
        {
          "id": "Adload.AD81",
          "display_name": "Adload.AD81",
          "target": null
        },
        {
          "id": "Packed.Asprotect",
          "display_name": "Packed.Asprotect",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34062",
          "display_name": "Gen:NN.ZemsilF.34062",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Agent.pwc",
          "display_name": "Agent.pwc",
          "target": null
        },
        {
          "id": "RiskTool.Phpw",
          "display_name": "RiskTool.Phpw",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Trojan.PWS",
          "display_name": "Trojan.PWS",
          "target": null
        },
        {
          "id": "Generic.BitCoinMiner.3",
          "display_name": "Generic.BitCoinMiner.3",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "Gen:NN",
          "display_name": "Gen:NN",
          "target": null
        },
        {
          "id": "Downloader.CertutilURLCache",
          "display_name": "Downloader.CertutilURLCache",
          "target": null
        },
        {
          "id": "Elf",
          "display_name": "Elf",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Kryptik.NRD",
          "display_name": "Kryptik.NRD",
          "target": null
        },
        {
          "id": "Riskware",
          "display_name": "Riskware",
          "target": null
        },
        {
          "id": "Kuluoz.B.gen",
          "display_name": "Kuluoz.B.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.RevengeRat",
          "display_name": "Gen:Variant.RevengeRat",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "VB.Chronos.7",
          "display_name": "VB.Chronos.7",
          "target": null
        },
        {
          "id": "Kryptik.NOE",
          "display_name": "Kryptik.NOE",
          "target": null
        },
        {
          "id": "HEUR:WebToolbar.Generic",
          "display_name": "HEUR:WebToolbar.Generic",
          "target": null
        },
        {
          "id": "Gen:Variant.Barys",
          "display_name": "Gen:Variant.Barys",
          "target": null
        },
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Gen:Variant.Graftor",
          "display_name": "Gen:Variant.Graftor",
          "target": null
        },
        {
          "id": "Backdoor.Agent",
          "display_name": "Backdoor.Agent",
          "target": null
        },
        {
          "id": "Unsafe",
          "display_name": "Unsafe",
          "target": null
        },
        {
          "id": "Trojan.PHP.Agent",
          "display_name": "Trojan.PHP.Agent",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Generic",
          "display_name": "HEUR:Exploit.Generic",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMALYM",
          "display_name": "Ransom_WCRY.SMALYM",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMJ",
          "display_name": "Ransom_WCRY.SMJ",
          "target": null
        },
        {
          "id": "Auslogics",
          "display_name": "Auslogics",
          "target": null
        },
        {
          "id": "Gen:Variant.Jaiko",
          "display_name": "Gen:Variant.Jaiko",
          "target": null
        },
        {
          "id": "Exploit.W32.Agent",
          "display_name": "Exploit.W32.Agent",
          "target": null
        },
        {
          "id": "Trojan.Cud.Gen",
          "display_name": "Trojan.Cud.Gen",
          "target": null
        },
        {
          "id": "Trojan.DOC.Downloader",
          "display_name": "Trojan.DOC.Downloader",
          "target": null
        },
        {
          "id": "Backdoor.MSIL.Agent",
          "display_name": "Backdoor.MSIL.Agent",
          "target": null
        },
        {
          "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Kazy",
          "display_name": "Gen:Variant.Kazy",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Ransom.WannaCrypt",
          "display_name": "Ransom.WannaCrypt",
          "target": null
        },
        {
          "id": "Generic.ServStart.A",
          "display_name": "Generic.ServStart.A",
          "target": null
        },
        {
          "id": "Trojan.Wanna",
          "display_name": "Trojan.Wanna",
          "target": null
        },
        {
          "id": "Generic.MSIL.Bladabindi",
          "display_name": "Generic.MSIL.Bladabindi",
          "target": null
        },
        {
          "id": "TROJ_GEN.R002C0OG518",
          "display_name": "TROJ_GEN.R002C0OG518",
          "target": null
        },
        {
          "id": "Trojan.Chapak",
          "display_name": "Trojan.Chapak",
          "target": null
        },
        {
          "id": "Indiloadz.BB",
          "display_name": "Indiloadz.BB",
          "target": null
        },
        {
          "id": "BehavBehavesLike.PUPXBI",
          "display_name": "BehavBehavesLike.PUPXBI",
          "target": null
        },
        {
          "id": "DeepScan:Generic.SpyAgent.6",
          "display_name": "DeepScan:Generic.SpyAgent.6",
          "target": null
        },
        {
          "id": "Python.KeyLogger",
          "display_name": "Python.KeyLogger",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Generic.MSIL.PasswordStealer",
          "display_name": "Generic.MSIL.PasswordStealer",
          "target": null
        },
        {
          "id": "PSW.Agent",
          "display_name": "PSW.Agent",
          "target": null
        },
        {
          "id": "malicious.8c45ba",
          "display_name": "malicious.8c45ba",
          "target": null
        },
        {
          "id": "Dropper.Binder",
          "display_name": "Dropper.Binder",
          "target": null
        },
        {
          "id": "Constructor.MSIL",
          "display_name": "Constructor.MSIL",
          "target": null
        },
        {
          "id": "Linux.Agent",
          "display_name": "Linux.Agent",
          "target": null
        },
        {
          "id": "Virus.3DMax.Script",
          "display_name": "Virus.3DMax.Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Application.SearchProtect",
          "display_name": "Application.SearchProtect",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Faceliker.A",
          "display_name": "Faceliker.A",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Faceliker",
          "display_name": "JS:Trojan.JS.Faceliker",
          "target": null
        },
        {
          "id": "Constructor.MSIL  Linux.Agent",
          "display_name": "Constructor.MSIL  Linux.Agent",
          "target": null
        },
        {
          "id": "PowerShell.Trojan",
          "display_name": "PowerShell.Trojan",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "Injector.CLDS",
          "display_name": "Injector.CLDS",
          "target": null
        },
        {
          "id": "VB.Downloader.2",
          "display_name": "VB.Downloader.2",
          "target": null
        },
        {
          "id": "malicious.3e78cc",
          "display_name": "malicious.3e78cc",
          "target": null
        },
        {
          "id": "malicious.d800d6",
          "display_name": "malicious.d800d6",
          "target": null
        },
        {
          "id": "VB.PwShell.2",
          "display_name": "VB.PwShell.2",
          "target": null
        },
        {
          "id": "Backdoor.RBot",
          "display_name": "Backdoor.RBot",
          "target": null
        },
        {
          "id": "malicious.71b1a8",
          "display_name": "malicious.71b1a8",
          "target": null
        },
        {
          "id": "TrojanSpy.KeyLogger",
          "display_name": "TrojanSpy.KeyLogger",
          "target": null
        },
        {
          "id": "Injector.JDO",
          "display_name": "Injector.JDO",
          "target": null
        },
        {
          "id": "Heur.Msword.Gen",
          "display_name": "Heur.Msword.Gen",
          "target": null
        },
        {
          "id": "PSW.Discord",
          "display_name": "PSW.Discord",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "HEUR:AdWare.StartSurf",
          "display_name": "HEUR:AdWare.StartSurf",
          "target": null
        },
        {
          "id": "Gen:Heur.NoobyProtect",
          "display_name": "Gen:Heur.NoobyProtect",
          "target": null
        },
        {
          "id": "CIL.HeapOverride",
          "display_name": "CIL.HeapOverride",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Tasker",
          "display_name": "HEUR:Trojan.Tasker",
          "target": null
        },
        {
          "id": "XLM.Trojan.Abracadabra.27",
          "display_name": "XLM.Trojan.Abracadabra.27",
          "target": null
        },
        {
          "id": "HEUR:Backdoor.MSIL.NanoBot",
          "display_name": "HEUR:Backdoor.MSIL.NanoBot",
          "target": null
        },
        {
          "id": "Trojan.PSW.Mimikatz",
          "display_name": "Trojan.PSW.Mimikatz",
          "target": null
        },
        {
          "id": "TrojanSpy.Python",
          "display_name": "TrojanSpy.Python",
          "target": null
        },
        {
          "id": "Trojan.Ole2.Vbs",
          "display_name": "Trojan.Ole2.Vbs",
          "target": null
        },
        {
          "id": "Exploit.MSOffice",
          "display_name": "Exploit.MSOffice",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.AmnesiaE",
          "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
          "target": null
        },
        {
          "id": "Wacatac.D6",
          "display_name": "Wacatac.D6",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "Packed.NetSeal",
          "display_name": "Packed.NetSeal",
          "target": null
        },
        {
          "id": "Trojan.MSIL.Injector",
          "display_name": "Trojan.MSIL.Injector",
          "target": null
        },
        {
          "id": "Trojan.PWS.Agent",
          "display_name": "Trojan.PWS.Agent",
          "target": null
        },
        {
          "id": "TScope.Trojan",
          "display_name": "TScope.Trojan",
          "target": null
        },
        {
          "id": "PSW.Stealer",
          "display_name": "PSW.Stealer",
          "target": null
        },
        {
          "id": "Trojan.PackedNET",
          "display_name": "Trojan.PackedNET",
          "target": null
        },
        {
          "id": "Trojan.Java",
          "display_name": "Trojan.Java",
          "target": null
        },
        {
          "id": "MalwareX",
          "display_name": "MalwareX",
          "target": null
        },
        {
          "id": "Trojan.PSW.Python",
          "display_name": "Trojan.PSW.Python",
          "target": null
        },
        {
          "id": "malicious.11abfc",
          "display_name": "malicious.11abfc",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSIL.Tasker",
          "display_name": "HEUR:Trojan.MSIL.Tasker",
          "target": null
        },
        {
          "id": "PossibleThreat.PALLAS",
          "display_name": "PossibleThreat.PALLAS",
          "target": null
        },
        {
          "id": "Backdoor.Poison",
          "display_name": "Backdoor.Poison",
          "target": null
        },
        {
          "id": "Generic.MSIL.LimeRAT",
          "display_name": "Generic.MSIL.LimeRAT",
          "target": null
        },
        {
          "id": "PWS-FCZZ",
          "display_name": "PWS-FCZZ",
          "target": null
        },
        {
          "id": "Trojan.Script",
          "display_name": "Trojan.Script",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Trojan.PWS.Growtopia",
          "display_name": "Trojan.PWS.Growtopia",
          "target": null
        },
        {
          "id": "Spyware.Bobik",
          "display_name": "Spyware.Bobik",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Hack.Patcher",
          "display_name": "Hack.Patcher",
          "target": null
        },
        {
          "id": "PWS.p",
          "display_name": "PWS.p",
          "target": null
        },
        {
          "id": "Suppobox",
          "display_name": "Suppobox",
          "target": null
        },
        {
          "id": "index.php",
          "display_name": "index.php",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "SmokeLoader",
          "display_name": "SmokeLoader",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.SAgent",
          "display_name": "HEUR:Trojan.MSOffice.SAgent",
          "target": null
        },
        {
          "id": "Script.INF",
          "display_name": "Script.INF",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Likejack",
          "display_name": "JS:Trojan.JS.Likejack",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "Trojan.JS.Agent",
          "display_name": "Trojan.JS.Agent",
          "target": null
        },
        {
          "id": "APT Notes",
          "display_name": "APT Notes",
          "target": null
        },
        {
          "id": "susp.rtf.objupdate",
          "display_name": "susp.rtf.objupdate",
          "target": null
        },
        {
          "id": "RedCap.zoohz",
          "display_name": "RedCap.zoohz",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "virus.office.qexvmc",
          "display_name": "virus.office.qexvmc",
          "target": null
        },
        {
          "id": "Trojan.KillProc",
          "display_name": "Trojan.KillProc",
          "target": null
        },
        {
          "id": "Generic.MSIL.GrwtpStealer.1",
          "display_name": "Generic.MSIL.GrwtpStealer.1",
          "target": null
        },
        {
          "id": "Suspicious.Cloud",
          "display_name": "Suspicious.Cloud",
          "target": null
        },
        {
          "id": "PowerShell.DownLoader",
          "display_name": "PowerShell.DownLoader",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "AGEN.1030939",
          "display_name": "AGEN.1030939",
          "target": null
        },
        {
          "id": "HackTool.Binder",
          "display_name": "HackTool.Binder",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "Dldr.Agent",
          "display_name": "Dldr.Agent",
          "target": null
        },
        {
          "id": "Dropper.MSIL",
          "display_name": "Dropper.MSIL",
          "target": null
        },
        {
          "id": "Trojan.VBKryjetor",
          "display_name": "Trojan.VBKryjetor",
          "target": null
        },
        {
          "id": "PWSX",
          "display_name": "PWSX",
          "target": null
        },
        {
          "id": "VB:Trojan.VBA.Agent",
          "display_name": "VB:Trojan.VBA.Agent",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Stratos",
          "display_name": "HEUR:Trojan.MSOffice.Stratos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1454",
          "name": "Malicious SMS Message",
          "display_name": "T1454 - Malicious SMS Message"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 339,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1184,
        "FileHash-SHA1": 949,
        "FileHash-SHA256": 3712,
        "URL": 2925,
        "domain": 627,
        "hostname": 1319,
        "CVE": 26,
        "email": 8,
        "CIDR": 2
      },
      "indicator_count": 10752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c597a4a45c8d84f0b15c1",
      "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
      "description": "Darkside 2020 Ecosystem .BEware\nMalicious Tor server. Link found in pulse created prior. \nMalvertizing target: Tsara Brashears\nRevenge Porn.\nThere may me others. Malicious Apple activities, locating, CVE exploits, unlocking, hijacker, service transfer, spyware, malicious full auth, tracking, endless. Seems to originate from a law firm that goes to far to defend clients and silence alleged victims. \nSome State allow  the same  privileges  and tools the federal government to insurance, workers compensation, investigators and insurance company law firms for investigations. \nFear tactics they seem willing to back up. I was approached and asked about my cyber knowledge by strangers. I am followed now for using a tool properly.\nALL terms auto populated from various tools from various tools used including, State, Brian Sabey, cyber stalking. Perhaps he's made contact with target. Danger!",
      "modified": "2023-12-09T03:01:57.989000",
      "created": "2023-11-09T04:00:58.166000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "communicating",
        "contacted",
        "resolutions",
        "whois record",
        "whois whois",
        "whois parent",
        "whois siblings",
        "skynet",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "million",
        "team",
        "microsoft",
        "back",
        "download",
        "phishing",
        "union",
        "bank",
        "malicious site",
        "blacklist http",
        "exit",
        "traffic",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "spammer",
        "malware",
        "dropped",
        "unlocker",
        "http",
        "critical risk",
        "redline stealer",
        "core",
        "hacktool",
        "execution",
        "type win32",
        "exe size",
        "first seen",
        "file name",
        "avast win32",
        "win32",
        "avg win32",
        "fortinet",
        "vitro",
        "mb first",
        "rmndrp",
        "clean mx",
        "undetected dns8",
        "undetected vx",
        "sophos",
        "vault",
        "zdb zeus",
        "cmc threat",
        "snort ip",
        "feodo tracker",
        "cybereason",
        "send bug",
        "pe yandex",
        "no data",
        "tag count",
        "count blacklist",
        "tag tag",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "first",
        "seen",
        "valid",
        "no na",
        "no no",
        "ip security",
        "cndst root",
        "ca x3",
        "ca id",
        "research group",
        "cnisrg root",
        "no expired",
        "mozilla",
        "android",
        "malicious red team",
        "tsara brashears",
        "cyber stalking",
        "malvertizing",
        "invasion of privacy",
        "threat",
        "adult content",
        "apple",
        "iphone unlocker",
        "android",
        "exploited spyware",
        "malware host",
        "brute force",
        "revenge-rat",
        "banker",
        "evasive",
        "domain",
        "redline",
        "stealer",
        "phishing",
        "ramnit",
        "unreliable subdomains",
        "dridex",
        "gating",
        "msil",
        "rat",
        "loki",
        "network",
        "hacking",
        "sinkhole",
        "azorult",
        "c2",
        "historicalandnew",
        "targeted attack",
        "puffstealer",
        "rultazo",
        "lokibot",
        "loki pws",
        "burkina",
        "banker,dde,dridex,exploit",
        "banker,dridex,evasive",
        "trickbot",
        "ransomware,torrentlocker",
        "exploit_source",
        "blacknet",
        "FileRepMalware",
        "linux agent",
        "blacknet",
        "ios",
        "phishing paypal",
        "tagging",
        "defacement",
        "hit",
        "bounty",
        "phishing site",
        "malware site",
        "malware download",
        "endangerment",
        "Malicious domain - SANS Internet Storm Center",
        "evasive,msil,rat,revenge-rat",
        "prism_setting",
        "prism_object",
        "static engine",
        "social engineering",
        "jansky",
        "worm",
        "network rat",
        "networm",
        "Loki Password Stealer (PWS)",
        "South Carolina Federal Credit Union phishing",
        "darkweb",
        "yandex",
        "redirectors",
        "blacknet threats",
        "phishing,ransomware,sinkhole",
        "wanacrypt0r,wannacry,wcry",
        "tor c++",
        "tor c++ client",
        "python user",
        "js user",
        "hacker",
        "hijacker",
        "heur",
        "maltiverse",
        "alexa top",
        "exploit",
        "riskware",
        "unsafe",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de indicators",
        "domains",
        "hashes",
        "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
        "malicious url",
        "financial",
        "blacknet rat",
        "azorult",
        "stealer",
        "deep scan",
        "blacklist https",
        "referrer",
        "collections kp",
        "incident ip",
        "sneaky server",
        "replacement",
        "unauthorized",
        "emotet",
        "noname057",
        "generic malware",
        "engineering",
        "cyber threat",
        "facebook",
        "paypal",
        "dropbox",
        "united",
        "america",
        "banking",
        "wells fargo",
        "steam",
        "twitter",
        "sliver",
        "daum",
        "swift",
        "runescape",
        "betabot",
        "district",
        "iframe",
        "alexa",
        "downldr",
        "agent",
        "presenoker",
        "bladabindi",
        "live",
        "conduit",
        "pony",
        "covid19",
        "malicious",
        "cobalt strike",
        "suppobox",
        "ramnit",
        "meterpreter",
        "virut",
        "njrat",
        "pykspa",
        "asyncrat",
        "downloader",
        "fakealert",
        "binder",
        "virustotal",
        "formbook",
        "necurs",
        "trojan",
        "msil",
        "hiloti",
        "vawtrak",
        "simda",
        "kraken",
        "solimba",
        "icedid",
        "redirector",
        "suspic",
        "amadey",
        "raccoon",
        "nanocore rat",
        "revenge rat",
        "genkryptik",
        "fuery",
        "wacatac",
        "service",
        "cloudeye",
        "tinba",
        "domaiq",
        "ave maria",
        "zeus",
        "ransomware",
        "zbot",
        "generic",
        "trojanspy",
        "states",
        "inmortal",
        "locky",
        "strike",
        "china cobalt",
        "keybase",
        "cutwail",
        "citadel",
        "radamant",
        "kovter",
        "bradesco",
        "nymaim",
        "amonetize",
        "bondat",
        "ghost rat",
        "vjw0rm",
        "bandoo",
        "matsnu",
        "dnspionage",
        "darkgate",
        "vidar",
        "keylogger",
        "remcos",
        "agenttesla",
        "detplock",
        "win64",
        "smokeloader",
        "agent tesla",
        "kgs0",
        "kls0",
        "urls",
        "type name",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "drpsuinstaller",
        "vdfsurfs",
        "opera",
        "icwrmind",
        "notepad",
        "installer",
        "miner",
        "unknown",
        "networm",
        "houdini",
        "quasar rat",
        "gamehack",
        "dbatloader",
        "qakbot",
        "ursnif",
        "CVE-2005-1790",
        "CVE-2009-3672",
        "CVE-2010-3962",
        "CVE-2012-3993",
        "CVE-2014-6332",
        "CVE-2017-11882",
        "CVE-2020-0601",
        "CVE-2020-0674",
        "hallrender.com",
        "brian sabey",
        "insurance",
        "botnetwork",
        "botmaster",
        "command_and_control",
        "CVE-2021-27065",
        "CVE-2021-40444",
        "CVE-2023-4966",
        "CVE-2017-0199",
        "CVE-2018-4893",
        "CVE-2010-3333",
        "CVE-2015-1641",
        "CVE-2017-0147",
        "CVE-2017-8570",
        "CVE-2018-0802",
        "CVE-2018-8373",
        "CVE-2017-8759",
        "CVE-2018-8453",
        "CVE-2014-3153",
        "CVE-2015-1650",
        "CVE-2017-0143",
        "CVE-2017-8464",
        "Icefog",
        "Delf.NBX",
        "$WebWatson",
        "Gen:Heur.Ransom.HiddenTears",
        "mobilekey.pw",
        "bitbucket.org",
        "Anomalous.100%",
        "malware distribution site",
        "gootkit",
        "edsaid",
        "rightsaided",
        "betabot",
        "cobaltstrike4.tk",
        "mas.to",
        "BehavesLike.YahLover",
        "srdvd16010404",
        "languageenu",
        "buildno",
        "channelisales",
        "vendorname2581",
        "osregion",
        "device",
        "systemlocale",
        "majorver16",
        "quasar",
        "find",
        "lockbit",
        "chaos",
        "ransomexx",
        "grandoreiro",
        "evilnum",
        "banker"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "20.99.186.246 exploit source",
        "fp2e7a.wpc.2be4.phicdn.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "init.ess.apple.com         (malicious code script)",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "IPv4 45.12.253.72.            command_and_control",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "IPv4 95.213.186.51              command_and_control",
        "Hostname: www.supernetforme.com      command_and_control",
        "IPv4 103.224.182.246        command_and_control",
        "IPv4 72.251.233.245           command_and_control",
        "IPv4 63.251.106.25             command_and_control",
        "IPv4 45.15.156.208            command_and_control",
        "IPv4 104.247.81.51             command_and_control",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "https://downloaddevtools.ir/     (phishing)",
        "happylifehappywife.com",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "Maltiverse Research Team",
        "URLscan.io",
        "Deep Research",
        "Hybrid Analysis",
        "URLhaus Abuse.ch",
        "Cyber Threat Coalition",
        "ThreatFox Abuse.ch"
      ],
      "public": 1,
      "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
      "targeted_countries": [
        "United States of America",
        "France",
        "Spain"
      ],
      "malware_families": [
        {
          "id": "Feodo",
          "display_name": "Feodo",
          "target": null
        },
        {
          "id": "Dridex",
          "display_name": "Dridex",
          "target": null
        },
        {
          "id": "Redline Stealer",
          "display_name": "Redline Stealer",
          "target": null
        },
        {
          "id": "Ramnit.N",
          "display_name": "Ramnit.N",
          "target": null
        },
        {
          "id": "Loki Bot",
          "display_name": "Loki Bot",
          "target": null
        },
        {
          "id": "Loki Password Stealer (PWS)",
          "display_name": "Loki Password Stealer (PWS)",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Zbd Zeus",
          "display_name": "Zbd Zeus",
          "target": null
        },
        {
          "id": "Trojan:MSIL/Burkina",
          "display_name": "Trojan:MSIL/Burkina",
          "target": "/malware/Trojan:MSIL/Burkina"
        },
        {
          "id": "Generic.TrickBot.1",
          "display_name": "Generic.TrickBot.1",
          "target": null
        },
        {
          "id": "Exploit.CVE",
          "display_name": "Exploit.CVE",
          "target": null
        },
        {
          "id": "Injector.IS.gen",
          "display_name": "Injector.IS.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Razy",
          "display_name": "Gen:Variant.Razy",
          "target": null
        },
        {
          "id": "Trojan.Androm.Gen",
          "display_name": "Trojan.Androm.Gen",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Linux.Agent",
          "display_name": "HEUR:Trojan.Linux.Agent",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "VBA.Downloader",
          "display_name": "VBA.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Notifier",
          "display_name": "Trojan.Notifier",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Alien",
          "display_name": "HEUR:Trojan.MSOffice.Alien",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_100%",
          "display_name": "Unsafe.AI_Score_100%",
          "target": null
        },
        {
          "id": "Gen:Variant.Johnnie",
          "display_name": "Gen:Variant.Johnnie",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan:Python/Downldr",
          "display_name": "Trojan:Python/Downldr",
          "target": "/malware/Trojan:Python/Downldr"
        },
        {
          "id": "Trojan:Linux/Downldr",
          "display_name": "Trojan:Linux/Downldr",
          "target": "/malware/Trojan:Linux/Downldr"
        },
        {
          "id": "Trojan:VBA/Downldr",
          "display_name": "Trojan:VBA/Downldr",
          "target": "/malware/Trojan:VBA/Downldr"
        },
        {
          "id": "TrojanDownloader:Linux/Downldr",
          "display_name": "TrojanDownloader:Linux/Downldr",
          "target": "/malware/TrojanDownloader:Linux/Downldr"
        },
        {
          "id": "Kryptik.FPH.gen",
          "display_name": "Kryptik.FPH.gen",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Phish.JAT",
          "display_name": "Phish.JAT",
          "target": null
        },
        {
          "id": "Phishing.HTML",
          "display_name": "Phishing.HTML",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "Phish.AB",
          "display_name": "Phish.AB",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "ml.Generic",
          "display_name": "ml.Generic",
          "target": null
        },
        {
          "id": "Xegumumune.8596c22f",
          "display_name": "Xegumumune.8596c22f",
          "target": null
        },
        {
          "id": "Generic.Malware.SMYB",
          "display_name": "Generic.Malware.SMYB",
          "target": null
        },
        {
          "id": "malicious.moderate.ml",
          "display_name": "malicious.moderate.ml",
          "target": null
        },
        {
          "id": "Agent.NBAE",
          "display_name": "Agent.NBAE",
          "target": null
        },
        {
          "id": "AGEN.1045227",
          "display_name": "AGEN.1045227",
          "target": null
        },
        {
          "id": "Riskware.Agent",
          "display_name": "Riskware.Agent",
          "target": null
        },
        {
          "id": "Gen:Variant.Cerbu",
          "display_name": "Gen:Variant.Cerbu",
          "target": null
        },
        {
          "id": "IL:Trojan.MSILZilla",
          "display_name": "IL:Trojan.MSILZilla",
          "target": null
        },
        {
          "id": "Dropped:Generic.Ransom.DMR",
          "display_name": "Dropped:Generic.Ransom.DMR",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Trojan.Heur",
          "display_name": "Trojan.Heur",
          "target": null
        },
        {
          "id": "Trojan.Malware.300983",
          "display_name": "Trojan.Malware.300983",
          "target": null
        },
        {
          "id": "SdBot.CAOC",
          "display_name": "SdBot.CAOC",
          "target": null
        },
        {
          "id": "Trojan.DelShad",
          "display_name": "Trojan.DelShad",
          "target": null
        },
        {
          "id": "Exploit CVE-2017-11882",
          "display_name": "Exploit CVE-2017-11882",
          "target": null
        },
        {
          "id": "GameHack.NL",
          "display_name": "GameHack.NL",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink",
          "display_name": "JS:Trojan.HideLink",
          "target": null
        },
        {
          "id": "Script.Agent",
          "display_name": "Script.Agent",
          "target": null
        },
        {
          "id": "Macro.Agent",
          "display_name": "Macro.Agent",
          "target": null
        },
        {
          "id": "Macro.Downloader.AMIP",
          "display_name": "Macro.Downloader.AMIP",
          "target": null
        },
        {
          "id": "Trojan.VBA",
          "display_name": "Trojan.VBA",
          "target": null
        },
        {
          "id": "HEUR.VBA.Trojan",
          "display_name": "HEUR.VBA.Trojan",
          "target": null
        },
        {
          "id": "VB.EmoooDldr.10",
          "display_name": "VB.EmoooDldr.10",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Packed-GV",
          "display_name": "Packed-GV",
          "target": null
        },
        {
          "id": "Adware.InstallMonetizer",
          "display_name": "Adware.InstallMonetizer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Zpevdo.B",
          "display_name": "Zpevdo.B",
          "target": null
        },
        {
          "id": "Presenoker",
          "display_name": "Presenoker",
          "target": null
        },
        {
          "id": "SGeneric",
          "display_name": "SGeneric",
          "target": null
        },
        {
          "id": "GameHack.DOM",
          "display_name": "GameHack.DOM",
          "target": null
        },
        {
          "id": "BehavesLike.Ransom",
          "display_name": "BehavesLike.Ransom",
          "target": null
        },
        {
          "id": "CIL.StupidCryptor",
          "display_name": "CIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.MSIL",
          "display_name": "Gen:Heur.Ransom.MSIL",
          "target": null
        },
        {
          "id": "Black.Gen2",
          "display_name": "Black.Gen2",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Trojan.HTML.PHISH",
          "display_name": "Trojan.HTML.PHISH",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Program.Unwanted",
          "display_name": "Program.Unwanted",
          "target": null
        },
        {
          "id": "HEUR/QVM42.3.72EB.Malware",
          "display_name": "HEUR/QVM42.3.72EB.Malware",
          "target": null
        },
        {
          "id": "suspicious.low.ml",
          "display_name": "suspicious.low.ml",
          "target": null
        },
        {
          "id": "JS:Trojan.Cryxos",
          "display_name": "JS:Trojan.Cryxos",
          "target": null
        },
        {
          "id": "Suspicious_GEN.F47V0520",
          "display_name": "Suspicious_GEN.F47V0520",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Generic",
          "display_name": "Dropper.Trojan.Generic",
          "target": null
        },
        {
          "id": "Trojan.TrickBot",
          "display_name": "Trojan.TrickBot",
          "target": null
        },
        {
          "id": "Malware.Tk.Generic",
          "display_name": "Malware.Tk.Generic",
          "target": null
        },
        {
          "id": "TrojanSpy.Java",
          "display_name": "TrojanSpy.Java",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "BehavesLike.Exploit",
          "display_name": "BehavesLike.Exploit",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34128",
          "display_name": "Gen:NN.ZemsilF.34128",
          "target": null
        },
        {
          "id": "Wacapew.C",
          "display_name": "Wacapew.C",
          "target": null
        },
        {
          "id": "Trojan.Malware.121218",
          "display_name": "Trojan.Malware.121218",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Trojan.Generic",
          "display_name": "Trojan.Generic",
          "target": null
        },
        {
          "id": "W32.Trojan",
          "display_name": "W32.Trojan",
          "target": null
        },
        {
          "id": "BScope.Riskware",
          "display_name": "BScope.Riskware",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147",
          "display_name": "Ransom:Win32/CVE-2017-0147",
          "target": "/malware/Ransom:Win32/CVE-2017-0147"
        },
        {
          "id": "Virus.Ramnit",
          "display_name": "Virus.Ramnit",
          "target": null
        },
        {
          "id": "Virus.Virut",
          "display_name": "Virus.Virut",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "AGEN.1141126",
          "display_name": "AGEN.1141126",
          "target": null
        },
        {
          "id": "W32.AIDetect",
          "display_name": "W32.AIDetect",
          "target": null
        },
        {
          "id": "Trojan.Python",
          "display_name": "Trojan.Python",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "Suspicious.Save",
          "display_name": "Suspicious.Save",
          "target": null
        },
        {
          "id": "Adware.Downware",
          "display_name": "Adware.Downware",
          "target": null
        },
        {
          "id": "Ransom.Win64.Wacatac.oa",
          "display_name": "Ransom.Win64.Wacatac.oa",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Gen:Variant.Midie",
          "display_name": "Gen:Variant.Midie",
          "target": null
        },
        {
          "id": "HEUR/QVM41.2.DA9B.Malware",
          "display_name": "HEUR/QVM41.2.DA9B.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Sirefef",
          "display_name": "Gen:Variant.Sirefef",
          "target": null
        },
        {
          "id": "Macro.Trojan.Dropperd",
          "display_name": "Macro.Trojan.Dropperd",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "Redcap.rlhse",
          "display_name": "Redcap.rlhse",
          "target": null
        },
        {
          "id": "Trojan.Trickster",
          "display_name": "Trojan.Trickster",
          "target": null
        },
        {
          "id": "HTML_REDIR.SMR",
          "display_name": "HTML_REDIR.SMR",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Hoax.JS.Phish",
          "display_name": "Hoax.JS.Phish",
          "target": null
        },
        {
          "id": "JS:Iframe",
          "display_name": "JS:Iframe",
          "target": null
        },
        {
          "id": "Application.SQLCrack",
          "display_name": "Application.SQLCrack",
          "target": null
        },
        {
          "id": "susp.lnk",
          "display_name": "susp.lnk",
          "target": null
        },
        {
          "id": "QVM201.0.B70B.Malware",
          "display_name": "QVM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebMonitor RAT",
          "display_name": "WebMonitor RAT",
          "target": null
        },
        {
          "id": "Tor - S0183",
          "display_name": "Tor - S0183",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCryptor",
          "display_name": "WannaCryptor",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.GandCrab5",
          "display_name": "DeepScan:Generic.Ransom.GandCrab5",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.32515",
          "display_name": "Gen:NN.ZexaF.32515",
          "target": null
        },
        {
          "id": "FileRepMalware",
          "display_name": "FileRepMalware",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILPerseus",
          "display_name": "Gen:Variant.MSILPerseus",
          "target": null
        },
        {
          "id": "Icefog",
          "display_name": "Icefog",
          "target": null
        },
        {
          "id": "$WebWatson",
          "display_name": "$WebWatson",
          "target": null
        },
        {
          "id": "Agent.AIK.gen",
          "display_name": "Agent.AIK.gen",
          "target": null
        },
        {
          "id": "Agent.AIK.genCIL.StupidCryptor",
          "display_name": "Agent.AIK.genCIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Agent.YPEZ",
          "display_name": "Agent.YPEZ",
          "target": null
        },
        {
          "id": "Application.InnovativSol",
          "display_name": "Application.InnovativSol",
          "target": null
        },
        {
          "id": "Agent.ASO",
          "display_name": "Agent.ASO",
          "target": null
        },
        {
          "id": "S-b748adc5",
          "display_name": "S-b748adc5",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "Kryptik.GUCB",
          "display_name": "Kryptik.GUCB",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Autoit.bimwt",
          "display_name": "Autoit.bimwt",
          "target": null
        },
        {
          "id": "HEUR:Trojan.OLE2.Alien",
          "display_name": "HEUR:Trojan.OLE2.Alien",
          "target": null
        },
        {
          "id": "AGEN.1038489",
          "display_name": "AGEN.1038489",
          "target": null
        },
        {
          "id": "Gen:Variant.Ser.Strictor",
          "display_name": "Gen:Variant.Ser.Strictor",
          "target": null
        },
        {
          "id": "Packed.Themida.Gen",
          "display_name": "Packed.Themida.Gen",
          "target": null
        },
        {
          "id": "AGEN.1043164",
          "display_name": "AGEN.1043164",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.PornoAsset",
          "display_name": "Trojan.PornoAsset",
          "target": null
        },
        {
          "id": "Ransom.Win64.PORNOASSET.SM1",
          "display_name": "Ransom.Win64.PORNOASSET.SM1",
          "target": null
        },
        {
          "id": "Gen:Variant.Ulise",
          "display_name": "Gen:Variant.Ulise",
          "target": null
        },
        {
          "id": "Trojan.Win64",
          "display_name": "Trojan.Win64",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Pantera.10",
          "display_name": "Heur.BZC.YAX.Pantera.10",
          "target": null
        },
        {
          "id": "malicious.high.ml",
          "display_name": "malicious.high.ml",
          "target": null
        },
        {
          "id": "CVE-2015-1650",
          "display_name": "CVE-2015-1650",
          "target": null
        },
        {
          "id": "Worm.Win64.AutoRun",
          "display_name": "Worm.Win64.AutoRun",
          "target": null
        },
        {
          "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "Pua.Gen",
          "display_name": "Pua.Gen",
          "target": null
        },
        {
          "id": "Trojan.Downloader.Generic",
          "display_name": "Trojan.Downloader.Generic",
          "target": null
        },
        {
          "id": "Suspected of Trojan.Downloader.gen",
          "display_name": "Suspected of Trojan.Downloader.gen",
          "target": null
        },
        {
          "id": "HEUR:RemoteAdmin.Generic",
          "display_name": "HEUR:RemoteAdmin.Generic",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.HiddenTears",
          "display_name": "Gen:Heur.Ransom.HiddenTears",
          "target": null
        },
        {
          "id": "Nemucod.A",
          "display_name": "Nemucod.A",
          "target": null
        },
        {
          "id": "Backdoor.Hupigon",
          "display_name": "Backdoor.Hupigon",
          "target": null
        },
        {
          "id": "Trojan.Starter JS.Iframe",
          "display_name": "Trojan.Starter JS.Iframe",
          "target": null
        },
        {
          "id": "fake ,promethiumm ,strongpity",
          "display_name": "fake ,promethiumm ,strongpity",
          "target": null
        },
        {
          "id": "PUA.Reg1staid",
          "display_name": "PUA.Reg1staid",
          "target": null
        },
        {
          "id": "Malware.Heur_Generic.A",
          "display_name": "Malware.Heur_Generic.A",
          "target": null
        },
        {
          "id": "Bladabindi.Q",
          "display_name": "Bladabindi.Q",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "malicious.6e0700",
          "display_name": "malicious.6e0700",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "RedCap.vneda",
          "display_name": "RedCap.vneda",
          "target": null
        },
        {
          "id": "Trojan.Indiloadz",
          "display_name": "Trojan.Indiloadz",
          "target": null
        },
        {
          "id": "Trojan.Ekstak",
          "display_name": "Trojan.Ekstak",
          "target": null
        },
        {
          "id": "staticrr.paleokits.net",
          "display_name": "staticrr.paleokits.net",
          "target": null
        },
        {
          "id": "MSIL.Downloader",
          "display_name": "MSIL.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Autoruns.GenericKDS",
          "display_name": "Trojan.Autoruns.GenericKDS",
          "target": null
        },
        {
          "id": "MSIL.Trojan.BSE",
          "display_name": "MSIL.Trojan.BSE",
          "target": null
        },
        {
          "id": "Adload.AD81",
          "display_name": "Adload.AD81",
          "target": null
        },
        {
          "id": "Packed.Asprotect",
          "display_name": "Packed.Asprotect",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34062",
          "display_name": "Gen:NN.ZemsilF.34062",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Agent.pwc",
          "display_name": "Agent.pwc",
          "target": null
        },
        {
          "id": "RiskTool.Phpw",
          "display_name": "RiskTool.Phpw",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Trojan.PWS",
          "display_name": "Trojan.PWS",
          "target": null
        },
        {
          "id": "Generic.BitCoinMiner.3",
          "display_name": "Generic.BitCoinMiner.3",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "Gen:NN",
          "display_name": "Gen:NN",
          "target": null
        },
        {
          "id": "Downloader.CertutilURLCache",
          "display_name": "Downloader.CertutilURLCache",
          "target": null
        },
        {
          "id": "Elf",
          "display_name": "Elf",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Kryptik.NRD",
          "display_name": "Kryptik.NRD",
          "target": null
        },
        {
          "id": "Riskware",
          "display_name": "Riskware",
          "target": null
        },
        {
          "id": "Kuluoz.B.gen",
          "display_name": "Kuluoz.B.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.RevengeRat",
          "display_name": "Gen:Variant.RevengeRat",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "VB.Chronos.7",
          "display_name": "VB.Chronos.7",
          "target": null
        },
        {
          "id": "Kryptik.NOE",
          "display_name": "Kryptik.NOE",
          "target": null
        },
        {
          "id": "HEUR:WebToolbar.Generic",
          "display_name": "HEUR:WebToolbar.Generic",
          "target": null
        },
        {
          "id": "Gen:Variant.Barys",
          "display_name": "Gen:Variant.Barys",
          "target": null
        },
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Gen:Variant.Graftor",
          "display_name": "Gen:Variant.Graftor",
          "target": null
        },
        {
          "id": "Backdoor.Agent",
          "display_name": "Backdoor.Agent",
          "target": null
        },
        {
          "id": "Unsafe",
          "display_name": "Unsafe",
          "target": null
        },
        {
          "id": "Trojan.PHP.Agent",
          "display_name": "Trojan.PHP.Agent",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Generic",
          "display_name": "HEUR:Exploit.Generic",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMALYM",
          "display_name": "Ransom_WCRY.SMALYM",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMJ",
          "display_name": "Ransom_WCRY.SMJ",
          "target": null
        },
        {
          "id": "Auslogics",
          "display_name": "Auslogics",
          "target": null
        },
        {
          "id": "Gen:Variant.Jaiko",
          "display_name": "Gen:Variant.Jaiko",
          "target": null
        },
        {
          "id": "Exploit.W32.Agent",
          "display_name": "Exploit.W32.Agent",
          "target": null
        },
        {
          "id": "Trojan.Cud.Gen",
          "display_name": "Trojan.Cud.Gen",
          "target": null
        },
        {
          "id": "Trojan.DOC.Downloader",
          "display_name": "Trojan.DOC.Downloader",
          "target": null
        },
        {
          "id": "Backdoor.MSIL.Agent",
          "display_name": "Backdoor.MSIL.Agent",
          "target": null
        },
        {
          "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Kazy",
          "display_name": "Gen:Variant.Kazy",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Ransom.WannaCrypt",
          "display_name": "Ransom.WannaCrypt",
          "target": null
        },
        {
          "id": "Generic.ServStart.A",
          "display_name": "Generic.ServStart.A",
          "target": null
        },
        {
          "id": "Trojan.Wanna",
          "display_name": "Trojan.Wanna",
          "target": null
        },
        {
          "id": "Generic.MSIL.Bladabindi",
          "display_name": "Generic.MSIL.Bladabindi",
          "target": null
        },
        {
          "id": "TROJ_GEN.R002C0OG518",
          "display_name": "TROJ_GEN.R002C0OG518",
          "target": null
        },
        {
          "id": "Trojan.Chapak",
          "display_name": "Trojan.Chapak",
          "target": null
        },
        {
          "id": "Indiloadz.BB",
          "display_name": "Indiloadz.BB",
          "target": null
        },
        {
          "id": "BehavBehavesLike.PUPXBI",
          "display_name": "BehavBehavesLike.PUPXBI",
          "target": null
        },
        {
          "id": "DeepScan:Generic.SpyAgent.6",
          "display_name": "DeepScan:Generic.SpyAgent.6",
          "target": null
        },
        {
          "id": "Python.KeyLogger",
          "display_name": "Python.KeyLogger",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Generic.MSIL.PasswordStealer",
          "display_name": "Generic.MSIL.PasswordStealer",
          "target": null
        },
        {
          "id": "PSW.Agent",
          "display_name": "PSW.Agent",
          "target": null
        },
        {
          "id": "malicious.8c45ba",
          "display_name": "malicious.8c45ba",
          "target": null
        },
        {
          "id": "Dropper.Binder",
          "display_name": "Dropper.Binder",
          "target": null
        },
        {
          "id": "Constructor.MSIL",
          "display_name": "Constructor.MSIL",
          "target": null
        },
        {
          "id": "Linux.Agent",
          "display_name": "Linux.Agent",
          "target": null
        },
        {
          "id": "Virus.3DMax.Script",
          "display_name": "Virus.3DMax.Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Application.SearchProtect",
          "display_name": "Application.SearchProtect",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Faceliker.A",
          "display_name": "Faceliker.A",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Faceliker",
          "display_name": "JS:Trojan.JS.Faceliker",
          "target": null
        },
        {
          "id": "Constructor.MSIL  Linux.Agent",
          "display_name": "Constructor.MSIL  Linux.Agent",
          "target": null
        },
        {
          "id": "PowerShell.Trojan",
          "display_name": "PowerShell.Trojan",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "Injector.CLDS",
          "display_name": "Injector.CLDS",
          "target": null
        },
        {
          "id": "VB.Downloader.2",
          "display_name": "VB.Downloader.2",
          "target": null
        },
        {
          "id": "malicious.3e78cc",
          "display_name": "malicious.3e78cc",
          "target": null
        },
        {
          "id": "malicious.d800d6",
          "display_name": "malicious.d800d6",
          "target": null
        },
        {
          "id": "VB.PwShell.2",
          "display_name": "VB.PwShell.2",
          "target": null
        },
        {
          "id": "Backdoor.RBot",
          "display_name": "Backdoor.RBot",
          "target": null
        },
        {
          "id": "malicious.71b1a8",
          "display_name": "malicious.71b1a8",
          "target": null
        },
        {
          "id": "TrojanSpy.KeyLogger",
          "display_name": "TrojanSpy.KeyLogger",
          "target": null
        },
        {
          "id": "Injector.JDO",
          "display_name": "Injector.JDO",
          "target": null
        },
        {
          "id": "Heur.Msword.Gen",
          "display_name": "Heur.Msword.Gen",
          "target": null
        },
        {
          "id": "PSW.Discord",
          "display_name": "PSW.Discord",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "HEUR:AdWare.StartSurf",
          "display_name": "HEUR:AdWare.StartSurf",
          "target": null
        },
        {
          "id": "Gen:Heur.NoobyProtect",
          "display_name": "Gen:Heur.NoobyProtect",
          "target": null
        },
        {
          "id": "CIL.HeapOverride",
          "display_name": "CIL.HeapOverride",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Tasker",
          "display_name": "HEUR:Trojan.Tasker",
          "target": null
        },
        {
          "id": "XLM.Trojan.Abracadabra.27",
          "display_name": "XLM.Trojan.Abracadabra.27",
          "target": null
        },
        {
          "id": "HEUR:Backdoor.MSIL.NanoBot",
          "display_name": "HEUR:Backdoor.MSIL.NanoBot",
          "target": null
        },
        {
          "id": "Trojan.PSW.Mimikatz",
          "display_name": "Trojan.PSW.Mimikatz",
          "target": null
        },
        {
          "id": "TrojanSpy.Python",
          "display_name": "TrojanSpy.Python",
          "target": null
        },
        {
          "id": "Trojan.Ole2.Vbs",
          "display_name": "Trojan.Ole2.Vbs",
          "target": null
        },
        {
          "id": "Exploit.MSOffice",
          "display_name": "Exploit.MSOffice",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.AmnesiaE",
          "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
          "target": null
        },
        {
          "id": "Wacatac.D6",
          "display_name": "Wacatac.D6",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "Packed.NetSeal",
          "display_name": "Packed.NetSeal",
          "target": null
        },
        {
          "id": "Trojan.MSIL.Injector",
          "display_name": "Trojan.MSIL.Injector",
          "target": null
        },
        {
          "id": "Trojan.PWS.Agent",
          "display_name": "Trojan.PWS.Agent",
          "target": null
        },
        {
          "id": "TScope.Trojan",
          "display_name": "TScope.Trojan",
          "target": null
        },
        {
          "id": "PSW.Stealer",
          "display_name": "PSW.Stealer",
          "target": null
        },
        {
          "id": "Trojan.PackedNET",
          "display_name": "Trojan.PackedNET",
          "target": null
        },
        {
          "id": "Trojan.Java",
          "display_name": "Trojan.Java",
          "target": null
        },
        {
          "id": "MalwareX",
          "display_name": "MalwareX",
          "target": null
        },
        {
          "id": "Trojan.PSW.Python",
          "display_name": "Trojan.PSW.Python",
          "target": null
        },
        {
          "id": "malicious.11abfc",
          "display_name": "malicious.11abfc",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSIL.Tasker",
          "display_name": "HEUR:Trojan.MSIL.Tasker",
          "target": null
        },
        {
          "id": "PossibleThreat.PALLAS",
          "display_name": "PossibleThreat.PALLAS",
          "target": null
        },
        {
          "id": "Backdoor.Poison",
          "display_name": "Backdoor.Poison",
          "target": null
        },
        {
          "id": "Generic.MSIL.LimeRAT",
          "display_name": "Generic.MSIL.LimeRAT",
          "target": null
        },
        {
          "id": "PWS-FCZZ",
          "display_name": "PWS-FCZZ",
          "target": null
        },
        {
          "id": "Trojan.Script",
          "display_name": "Trojan.Script",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Trojan.PWS.Growtopia",
          "display_name": "Trojan.PWS.Growtopia",
          "target": null
        },
        {
          "id": "Spyware.Bobik",
          "display_name": "Spyware.Bobik",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Hack.Patcher",
          "display_name": "Hack.Patcher",
          "target": null
        },
        {
          "id": "PWS.p",
          "display_name": "PWS.p",
          "target": null
        },
        {
          "id": "Suppobox",
          "display_name": "Suppobox",
          "target": null
        },
        {
          "id": "index.php",
          "display_name": "index.php",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "SmokeLoader",
          "display_name": "SmokeLoader",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.SAgent",
          "display_name": "HEUR:Trojan.MSOffice.SAgent",
          "target": null
        },
        {
          "id": "Script.INF",
          "display_name": "Script.INF",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Likejack",
          "display_name": "JS:Trojan.JS.Likejack",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "Trojan.JS.Agent",
          "display_name": "Trojan.JS.Agent",
          "target": null
        },
        {
          "id": "APT Notes",
          "display_name": "APT Notes",
          "target": null
        },
        {
          "id": "susp.rtf.objupdate",
          "display_name": "susp.rtf.objupdate",
          "target": null
        },
        {
          "id": "RedCap.zoohz",
          "display_name": "RedCap.zoohz",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "virus.office.qexvmc",
          "display_name": "virus.office.qexvmc",
          "target": null
        },
        {
          "id": "Trojan.KillProc",
          "display_name": "Trojan.KillProc",
          "target": null
        },
        {
          "id": "Generic.MSIL.GrwtpStealer.1",
          "display_name": "Generic.MSIL.GrwtpStealer.1",
          "target": null
        },
        {
          "id": "Suspicious.Cloud",
          "display_name": "Suspicious.Cloud",
          "target": null
        },
        {
          "id": "PowerShell.DownLoader",
          "display_name": "PowerShell.DownLoader",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "AGEN.1030939",
          "display_name": "AGEN.1030939",
          "target": null
        },
        {
          "id": "HackTool.Binder",
          "display_name": "HackTool.Binder",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "Dldr.Agent",
          "display_name": "Dldr.Agent",
          "target": null
        },
        {
          "id": "Dropper.MSIL",
          "display_name": "Dropper.MSIL",
          "target": null
        },
        {
          "id": "Trojan.VBKryjetor",
          "display_name": "Trojan.VBKryjetor",
          "target": null
        },
        {
          "id": "PWSX",
          "display_name": "PWSX",
          "target": null
        },
        {
          "id": "VB:Trojan.VBA.Agent",
          "display_name": "VB:Trojan.VBA.Agent",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Stratos",
          "display_name": "HEUR:Trojan.MSOffice.Stratos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1454",
          "name": "Malicious SMS Message",
          "display_name": "T1454 - Malicious SMS Message"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 338,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1184,
        "FileHash-SHA1": 949,
        "FileHash-SHA256": 3712,
        "URL": 2925,
        "domain": 627,
        "hostname": 1319,
        "CVE": 26,
        "email": 8,
        "CIDR": 2
      },
      "indicator_count": 10752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c606d74f82e547c77ad89",
      "name": "Ransom.Win64.PORNOASSET.SM1 | DeepScan:Generic.Ransom.GandCrab5",
      "description": "Ransom.Win64.PORNOASSET.SM1 DeepScan:Generic.Ransom.GandCrab5\nBlackNET RAT $WebWatson\nAuto generated results from a variety of tools.",
      "modified": "2023-12-09T03:01:57.989000",
      "created": "2023-11-09T04:30:37.089000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "communicating",
        "contacted",
        "resolutions",
        "whois record",
        "whois whois",
        "whois parent",
        "whois siblings",
        "skynet",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "million",
        "team",
        "microsoft",
        "back",
        "download",
        "phishing",
        "union",
        "bank",
        "malicious site",
        "blacklist http",
        "exit",
        "traffic",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "spammer",
        "malware",
        "dropped",
        "unlocker",
        "http",
        "critical risk",
        "redline stealer",
        "core",
        "hacktool",
        "execution",
        "type win32",
        "exe size",
        "first seen",
        "file name",
        "avast win32",
        "win32",
        "avg win32",
        "fortinet",
        "vitro",
        "mb first",
        "rmndrp",
        "clean mx",
        "undetected dns8",
        "undetected vx",
        "sophos",
        "vault",
        "zdb zeus",
        "cmc threat",
        "snort ip",
        "feodo tracker",
        "cybereason",
        "send bug",
        "pe yandex",
        "no data",
        "tag count",
        "count blacklist",
        "tag tag",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "first",
        "seen",
        "valid",
        "no na",
        "no no",
        "ip security",
        "cndst root",
        "ca x3",
        "ca id",
        "research group",
        "cnisrg root",
        "no expired",
        "mozilla",
        "android",
        "malicious red team",
        "tsara brashears",
        "cyber stalking",
        "malvertizing",
        "invasion of privacy",
        "threat",
        "adult content",
        "apple",
        "iphone unlocker",
        "android",
        "exploited spyware",
        "malware host",
        "brute force",
        "revenge-rat",
        "banker",
        "evasive",
        "domain",
        "redline",
        "stealer",
        "phishing",
        "ramnit",
        "unreliable subdomains",
        "dridex",
        "gating",
        "msil",
        "rat",
        "loki",
        "network",
        "hacking",
        "sinkhole",
        "azorult",
        "c2",
        "historicalandnew",
        "targeted attack",
        "puffstealer",
        "rultazo",
        "lokibot",
        "loki pws",
        "burkina",
        "banker,dde,dridex,exploit",
        "banker,dridex,evasive",
        "trickbot",
        "ransomware,torrentlocker",
        "exploit_source",
        "blacknet",
        "FileRepMalware",
        "linux agent",
        "blacknet",
        "ios",
        "phishing paypal",
        "tagging",
        "defacement",
        "hit",
        "bounty",
        "phishing site",
        "malware site",
        "malware download",
        "endangerment",
        "Malicious domain - SANS Internet Storm Center",
        "evasive,msil,rat,revenge-rat",
        "prism_setting",
        "prism_object",
        "static engine",
        "social engineering",
        "jansky",
        "worm",
        "network rat",
        "networm",
        "Loki Password Stealer (PWS)",
        "South Carolina Federal Credit Union phishing",
        "darkweb",
        "yandex",
        "redirectors",
        "blacknet threats",
        "phishing,ransomware,sinkhole",
        "wanacrypt0r,wannacry,wcry",
        "tor c++",
        "tor c++ client",
        "python user",
        "js user",
        "hacker",
        "hijacker",
        "heur",
        "maltiverse",
        "alexa top",
        "exploit",
        "riskware",
        "unsafe",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de indicators",
        "domains",
        "hashes",
        "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
        "malicious url",
        "financial",
        "blacknet rat",
        "azorult",
        "stealer",
        "deep scan",
        "blacklist https",
        "referrer",
        "collections kp",
        "incident ip",
        "sneaky server",
        "replacement",
        "unauthorized",
        "emotet",
        "noname057",
        "generic malware",
        "engineering",
        "cyber threat",
        "facebook",
        "paypal",
        "dropbox",
        "united",
        "america",
        "banking",
        "wells fargo",
        "steam",
        "twitter",
        "sliver",
        "daum",
        "swift",
        "runescape",
        "betabot",
        "district",
        "iframe",
        "alexa",
        "downldr",
        "agent",
        "presenoker",
        "bladabindi",
        "live",
        "conduit",
        "pony",
        "covid19",
        "malicious",
        "cobalt strike",
        "suppobox",
        "ramnit",
        "meterpreter",
        "virut",
        "njrat",
        "pykspa",
        "asyncrat",
        "downloader",
        "fakealert",
        "binder",
        "virustotal",
        "formbook",
        "necurs",
        "trojan",
        "msil",
        "hiloti",
        "vawtrak",
        "simda",
        "kraken",
        "solimba",
        "icedid",
        "redirector",
        "suspic",
        "amadey",
        "raccoon",
        "nanocore rat",
        "revenge rat",
        "genkryptik",
        "fuery",
        "wacatac",
        "service",
        "cloudeye",
        "tinba",
        "domaiq",
        "ave maria",
        "zeus",
        "ransomware",
        "zbot",
        "generic",
        "trojanspy",
        "states",
        "inmortal",
        "locky",
        "strike",
        "china cobalt",
        "keybase",
        "cutwail",
        "citadel",
        "radamant",
        "kovter",
        "bradesco",
        "nymaim",
        "amonetize",
        "bondat",
        "ghost rat",
        "vjw0rm",
        "bandoo",
        "matsnu",
        "dnspionage",
        "darkgate",
        "vidar",
        "keylogger",
        "remcos",
        "agenttesla",
        "detplock",
        "win64",
        "smokeloader",
        "agent tesla",
        "kgs0",
        "kls0",
        "urls",
        "type name",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "drpsuinstaller",
        "vdfsurfs",
        "opera",
        "icwrmind",
        "notepad",
        "installer",
        "miner",
        "unknown",
        "networm",
        "houdini",
        "quasar rat",
        "gamehack",
        "dbatloader",
        "qakbot",
        "ursnif",
        "CVE-2005-1790",
        "CVE-2009-3672",
        "CVE-2010-3962",
        "CVE-2012-3993",
        "CVE-2014-6332",
        "CVE-2017-11882",
        "CVE-2020-0601",
        "CVE-2020-0674",
        "hallrender.com",
        "brian sabey",
        "insurance",
        "botnetwork",
        "botmaster",
        "command_and_control",
        "CVE-2021-27065",
        "CVE-2021-40444",
        "CVE-2023-4966",
        "CVE-2017-0199",
        "CVE-2018-4893",
        "CVE-2010-3333",
        "CVE-2015-1641",
        "CVE-2017-0147",
        "CVE-2017-8570",
        "CVE-2018-0802",
        "CVE-2018-8373",
        "CVE-2017-8759",
        "CVE-2018-8453",
        "CVE-2014-3153",
        "CVE-2015-1650",
        "CVE-2017-0143",
        "CVE-2017-8464",
        "Icefog",
        "Delf.NBX",
        "$WebWatson",
        "Gen:Heur.Ransom.HiddenTears",
        "mobilekey.pw",
        "bitbucket.org",
        "Anomalous.100%",
        "malware distribution site",
        "gootkit",
        "edsaid",
        "rightsaided",
        "betabot",
        "cobaltstrike4.tk",
        "mas.to",
        "BehavesLike.YahLover",
        "srdvd16010404",
        "languageenu",
        "buildno",
        "channelisales",
        "vendorname2581",
        "osregion",
        "device",
        "systemlocale",
        "majorver16",
        "quasar",
        "find",
        "lockbit",
        "chaos",
        "ransomexx",
        "grandoreiro",
        "evilnum",
        "banker"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "20.99.186.246 exploit source",
        "fp2e7a.wpc.2be4.phicdn.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "init.ess.apple.com         (malicious code script)",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "IPv4 45.12.253.72.            command_and_control",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "IPv4 95.213.186.51              command_and_control",
        "Hostname: www.supernetforme.com      command_and_control",
        "IPv4 103.224.182.246        command_and_control",
        "IPv4 72.251.233.245           command_and_control",
        "IPv4 63.251.106.25             command_and_control",
        "IPv4 45.15.156.208            command_and_control",
        "IPv4 104.247.81.51             command_and_control",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "https://downloaddevtools.ir/     (phishing)",
        "happylifehappywife.com",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "Maltiverse Research Team",
        "URLscan.io",
        "Deep Research",
        "Hybrid Analysis",
        "URLhaus Abuse.ch",
        "Cyber Threat Coalition",
        "ThreatFox Abuse.ch"
      ],
      "public": 1,
      "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
      "targeted_countries": [
        "United States of America",
        "France",
        "Spain"
      ],
      "malware_families": [
        {
          "id": "Feodo",
          "display_name": "Feodo",
          "target": null
        },
        {
          "id": "Dridex",
          "display_name": "Dridex",
          "target": null
        },
        {
          "id": "Redline Stealer",
          "display_name": "Redline Stealer",
          "target": null
        },
        {
          "id": "Ramnit.N",
          "display_name": "Ramnit.N",
          "target": null
        },
        {
          "id": "Loki Bot",
          "display_name": "Loki Bot",
          "target": null
        },
        {
          "id": "Loki Password Stealer (PWS)",
          "display_name": "Loki Password Stealer (PWS)",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Zbd Zeus",
          "display_name": "Zbd Zeus",
          "target": null
        },
        {
          "id": "Trojan:MSIL/Burkina",
          "display_name": "Trojan:MSIL/Burkina",
          "target": "/malware/Trojan:MSIL/Burkina"
        },
        {
          "id": "Generic.TrickBot.1",
          "display_name": "Generic.TrickBot.1",
          "target": null
        },
        {
          "id": "Exploit.CVE",
          "display_name": "Exploit.CVE",
          "target": null
        },
        {
          "id": "Injector.IS.gen",
          "display_name": "Injector.IS.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Razy",
          "display_name": "Gen:Variant.Razy",
          "target": null
        },
        {
          "id": "Trojan.Androm.Gen",
          "display_name": "Trojan.Androm.Gen",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Linux.Agent",
          "display_name": "HEUR:Trojan.Linux.Agent",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "VBA.Downloader",
          "display_name": "VBA.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Notifier",
          "display_name": "Trojan.Notifier",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Alien",
          "display_name": "HEUR:Trojan.MSOffice.Alien",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_100%",
          "display_name": "Unsafe.AI_Score_100%",
          "target": null
        },
        {
          "id": "Gen:Variant.Johnnie",
          "display_name": "Gen:Variant.Johnnie",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan:Python/Downldr",
          "display_name": "Trojan:Python/Downldr",
          "target": "/malware/Trojan:Python/Downldr"
        },
        {
          "id": "Trojan:Linux/Downldr",
          "display_name": "Trojan:Linux/Downldr",
          "target": "/malware/Trojan:Linux/Downldr"
        },
        {
          "id": "Trojan:VBA/Downldr",
          "display_name": "Trojan:VBA/Downldr",
          "target": "/malware/Trojan:VBA/Downldr"
        },
        {
          "id": "TrojanDownloader:Linux/Downldr",
          "display_name": "TrojanDownloader:Linux/Downldr",
          "target": "/malware/TrojanDownloader:Linux/Downldr"
        },
        {
          "id": "Kryptik.FPH.gen",
          "display_name": "Kryptik.FPH.gen",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Phish.JAT",
          "display_name": "Phish.JAT",
          "target": null
        },
        {
          "id": "Phishing.HTML",
          "display_name": "Phishing.HTML",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "Phish.AB",
          "display_name": "Phish.AB",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "ml.Generic",
          "display_name": "ml.Generic",
          "target": null
        },
        {
          "id": "Xegumumune.8596c22f",
          "display_name": "Xegumumune.8596c22f",
          "target": null
        },
        {
          "id": "Generic.Malware.SMYB",
          "display_name": "Generic.Malware.SMYB",
          "target": null
        },
        {
          "id": "malicious.moderate.ml",
          "display_name": "malicious.moderate.ml",
          "target": null
        },
        {
          "id": "Agent.NBAE",
          "display_name": "Agent.NBAE",
          "target": null
        },
        {
          "id": "AGEN.1045227",
          "display_name": "AGEN.1045227",
          "target": null
        },
        {
          "id": "Riskware.Agent",
          "display_name": "Riskware.Agent",
          "target": null
        },
        {
          "id": "Gen:Variant.Cerbu",
          "display_name": "Gen:Variant.Cerbu",
          "target": null
        },
        {
          "id": "IL:Trojan.MSILZilla",
          "display_name": "IL:Trojan.MSILZilla",
          "target": null
        },
        {
          "id": "Dropped:Generic.Ransom.DMR",
          "display_name": "Dropped:Generic.Ransom.DMR",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Trojan.Heur",
          "display_name": "Trojan.Heur",
          "target": null
        },
        {
          "id": "Trojan.Malware.300983",
          "display_name": "Trojan.Malware.300983",
          "target": null
        },
        {
          "id": "SdBot.CAOC",
          "display_name": "SdBot.CAOC",
          "target": null
        },
        {
          "id": "Trojan.DelShad",
          "display_name": "Trojan.DelShad",
          "target": null
        },
        {
          "id": "Exploit CVE-2017-11882",
          "display_name": "Exploit CVE-2017-11882",
          "target": null
        },
        {
          "id": "GameHack.NL",
          "display_name": "GameHack.NL",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink",
          "display_name": "JS:Trojan.HideLink",
          "target": null
        },
        {
          "id": "Script.Agent",
          "display_name": "Script.Agent",
          "target": null
        },
        {
          "id": "Macro.Agent",
          "display_name": "Macro.Agent",
          "target": null
        },
        {
          "id": "Macro.Downloader.AMIP",
          "display_name": "Macro.Downloader.AMIP",
          "target": null
        },
        {
          "id": "Trojan.VBA",
          "display_name": "Trojan.VBA",
          "target": null
        },
        {
          "id": "HEUR.VBA.Trojan",
          "display_name": "HEUR.VBA.Trojan",
          "target": null
        },
        {
          "id": "VB.EmoooDldr.10",
          "display_name": "VB.EmoooDldr.10",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Packed-GV",
          "display_name": "Packed-GV",
          "target": null
        },
        {
          "id": "Adware.InstallMonetizer",
          "display_name": "Adware.InstallMonetizer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Zpevdo.B",
          "display_name": "Zpevdo.B",
          "target": null
        },
        {
          "id": "Presenoker",
          "display_name": "Presenoker",
          "target": null
        },
        {
          "id": "SGeneric",
          "display_name": "SGeneric",
          "target": null
        },
        {
          "id": "GameHack.DOM",
          "display_name": "GameHack.DOM",
          "target": null
        },
        {
          "id": "BehavesLike.Ransom",
          "display_name": "BehavesLike.Ransom",
          "target": null
        },
        {
          "id": "CIL.StupidCryptor",
          "display_name": "CIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.MSIL",
          "display_name": "Gen:Heur.Ransom.MSIL",
          "target": null
        },
        {
          "id": "Black.Gen2",
          "display_name": "Black.Gen2",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Trojan.HTML.PHISH",
          "display_name": "Trojan.HTML.PHISH",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Program.Unwanted",
          "display_name": "Program.Unwanted",
          "target": null
        },
        {
          "id": "HEUR/QVM42.3.72EB.Malware",
          "display_name": "HEUR/QVM42.3.72EB.Malware",
          "target": null
        },
        {
          "id": "suspicious.low.ml",
          "display_name": "suspicious.low.ml",
          "target": null
        },
        {
          "id": "JS:Trojan.Cryxos",
          "display_name": "JS:Trojan.Cryxos",
          "target": null
        },
        {
          "id": "Suspicious_GEN.F47V0520",
          "display_name": "Suspicious_GEN.F47V0520",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Generic",
          "display_name": "Dropper.Trojan.Generic",
          "target": null
        },
        {
          "id": "Trojan.TrickBot",
          "display_name": "Trojan.TrickBot",
          "target": null
        },
        {
          "id": "Malware.Tk.Generic",
          "display_name": "Malware.Tk.Generic",
          "target": null
        },
        {
          "id": "TrojanSpy.Java",
          "display_name": "TrojanSpy.Java",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "BehavesLike.Exploit",
          "display_name": "BehavesLike.Exploit",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34128",
          "display_name": "Gen:NN.ZemsilF.34128",
          "target": null
        },
        {
          "id": "Wacapew.C",
          "display_name": "Wacapew.C",
          "target": null
        },
        {
          "id": "Trojan.Malware.121218",
          "display_name": "Trojan.Malware.121218",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Trojan.Generic",
          "display_name": "Trojan.Generic",
          "target": null
        },
        {
          "id": "W32.Trojan",
          "display_name": "W32.Trojan",
          "target": null
        },
        {
          "id": "BScope.Riskware",
          "display_name": "BScope.Riskware",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147",
          "display_name": "Ransom:Win32/CVE-2017-0147",
          "target": "/malware/Ransom:Win32/CVE-2017-0147"
        },
        {
          "id": "Virus.Ramnit",
          "display_name": "Virus.Ramnit",
          "target": null
        },
        {
          "id": "Virus.Virut",
          "display_name": "Virus.Virut",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "AGEN.1141126",
          "display_name": "AGEN.1141126",
          "target": null
        },
        {
          "id": "W32.AIDetect",
          "display_name": "W32.AIDetect",
          "target": null
        },
        {
          "id": "Trojan.Python",
          "display_name": "Trojan.Python",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "Suspicious.Save",
          "display_name": "Suspicious.Save",
          "target": null
        },
        {
          "id": "Adware.Downware",
          "display_name": "Adware.Downware",
          "target": null
        },
        {
          "id": "Ransom.Win64.Wacatac.oa",
          "display_name": "Ransom.Win64.Wacatac.oa",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Gen:Variant.Midie",
          "display_name": "Gen:Variant.Midie",
          "target": null
        },
        {
          "id": "HEUR/QVM41.2.DA9B.Malware",
          "display_name": "HEUR/QVM41.2.DA9B.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Sirefef",
          "display_name": "Gen:Variant.Sirefef",
          "target": null
        },
        {
          "id": "Macro.Trojan.Dropperd",
          "display_name": "Macro.Trojan.Dropperd",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "Redcap.rlhse",
          "display_name": "Redcap.rlhse",
          "target": null
        },
        {
          "id": "Trojan.Trickster",
          "display_name": "Trojan.Trickster",
          "target": null
        },
        {
          "id": "HTML_REDIR.SMR",
          "display_name": "HTML_REDIR.SMR",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Hoax.JS.Phish",
          "display_name": "Hoax.JS.Phish",
          "target": null
        },
        {
          "id": "JS:Iframe",
          "display_name": "JS:Iframe",
          "target": null
        },
        {
          "id": "Application.SQLCrack",
          "display_name": "Application.SQLCrack",
          "target": null
        },
        {
          "id": "susp.lnk",
          "display_name": "susp.lnk",
          "target": null
        },
        {
          "id": "QVM201.0.B70B.Malware",
          "display_name": "QVM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebMonitor RAT",
          "display_name": "WebMonitor RAT",
          "target": null
        },
        {
          "id": "Tor - S0183",
          "display_name": "Tor - S0183",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCryptor",
          "display_name": "WannaCryptor",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.GandCrab5",
          "display_name": "DeepScan:Generic.Ransom.GandCrab5",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.32515",
          "display_name": "Gen:NN.ZexaF.32515",
          "target": null
        },
        {
          "id": "FileRepMalware",
          "display_name": "FileRepMalware",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILPerseus",
          "display_name": "Gen:Variant.MSILPerseus",
          "target": null
        },
        {
          "id": "Icefog",
          "display_name": "Icefog",
          "target": null
        },
        {
          "id": "$WebWatson",
          "display_name": "$WebWatson",
          "target": null
        },
        {
          "id": "Agent.AIK.gen",
          "display_name": "Agent.AIK.gen",
          "target": null
        },
        {
          "id": "Agent.AIK.genCIL.StupidCryptor",
          "display_name": "Agent.AIK.genCIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Agent.YPEZ",
          "display_name": "Agent.YPEZ",
          "target": null
        },
        {
          "id": "Application.InnovativSol",
          "display_name": "Application.InnovativSol",
          "target": null
        },
        {
          "id": "Agent.ASO",
          "display_name": "Agent.ASO",
          "target": null
        },
        {
          "id": "S-b748adc5",
          "display_name": "S-b748adc5",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "Kryptik.GUCB",
          "display_name": "Kryptik.GUCB",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Autoit.bimwt",
          "display_name": "Autoit.bimwt",
          "target": null
        },
        {
          "id": "HEUR:Trojan.OLE2.Alien",
          "display_name": "HEUR:Trojan.OLE2.Alien",
          "target": null
        },
        {
          "id": "AGEN.1038489",
          "display_name": "AGEN.1038489",
          "target": null
        },
        {
          "id": "Gen:Variant.Ser.Strictor",
          "display_name": "Gen:Variant.Ser.Strictor",
          "target": null
        },
        {
          "id": "Packed.Themida.Gen",
          "display_name": "Packed.Themida.Gen",
          "target": null
        },
        {
          "id": "AGEN.1043164",
          "display_name": "AGEN.1043164",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.PornoAsset",
          "display_name": "Trojan.PornoAsset",
          "target": null
        },
        {
          "id": "Ransom.Win64.PORNOASSET.SM1",
          "display_name": "Ransom.Win64.PORNOASSET.SM1",
          "target": null
        },
        {
          "id": "Gen:Variant.Ulise",
          "display_name": "Gen:Variant.Ulise",
          "target": null
        },
        {
          "id": "Trojan.Win64",
          "display_name": "Trojan.Win64",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Pantera.10",
          "display_name": "Heur.BZC.YAX.Pantera.10",
          "target": null
        },
        {
          "id": "malicious.high.ml",
          "display_name": "malicious.high.ml",
          "target": null
        },
        {
          "id": "CVE-2015-1650",
          "display_name": "CVE-2015-1650",
          "target": null
        },
        {
          "id": "Worm.Win64.AutoRun",
          "display_name": "Worm.Win64.AutoRun",
          "target": null
        },
        {
          "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "Pua.Gen",
          "display_name": "Pua.Gen",
          "target": null
        },
        {
          "id": "Trojan.Downloader.Generic",
          "display_name": "Trojan.Downloader.Generic",
          "target": null
        },
        {
          "id": "Suspected of Trojan.Downloader.gen",
          "display_name": "Suspected of Trojan.Downloader.gen",
          "target": null
        },
        {
          "id": "HEUR:RemoteAdmin.Generic",
          "display_name": "HEUR:RemoteAdmin.Generic",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.HiddenTears",
          "display_name": "Gen:Heur.Ransom.HiddenTears",
          "target": null
        },
        {
          "id": "Nemucod.A",
          "display_name": "Nemucod.A",
          "target": null
        },
        {
          "id": "Backdoor.Hupigon",
          "display_name": "Backdoor.Hupigon",
          "target": null
        },
        {
          "id": "Trojan.Starter JS.Iframe",
          "display_name": "Trojan.Starter JS.Iframe",
          "target": null
        },
        {
          "id": "fake ,promethiumm ,strongpity",
          "display_name": "fake ,promethiumm ,strongpity",
          "target": null
        },
        {
          "id": "PUA.Reg1staid",
          "display_name": "PUA.Reg1staid",
          "target": null
        },
        {
          "id": "Malware.Heur_Generic.A",
          "display_name": "Malware.Heur_Generic.A",
          "target": null
        },
        {
          "id": "Bladabindi.Q",
          "display_name": "Bladabindi.Q",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "malicious.6e0700",
          "display_name": "malicious.6e0700",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "RedCap.vneda",
          "display_name": "RedCap.vneda",
          "target": null
        },
        {
          "id": "Trojan.Indiloadz",
          "display_name": "Trojan.Indiloadz",
          "target": null
        },
        {
          "id": "Trojan.Ekstak",
          "display_name": "Trojan.Ekstak",
          "target": null
        },
        {
          "id": "staticrr.paleokits.net",
          "display_name": "staticrr.paleokits.net",
          "target": null
        },
        {
          "id": "MSIL.Downloader",
          "display_name": "MSIL.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Autoruns.GenericKDS",
          "display_name": "Trojan.Autoruns.GenericKDS",
          "target": null
        },
        {
          "id": "MSIL.Trojan.BSE",
          "display_name": "MSIL.Trojan.BSE",
          "target": null
        },
        {
          "id": "Adload.AD81",
          "display_name": "Adload.AD81",
          "target": null
        },
        {
          "id": "Packed.Asprotect",
          "display_name": "Packed.Asprotect",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34062",
          "display_name": "Gen:NN.ZemsilF.34062",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Agent.pwc",
          "display_name": "Agent.pwc",
          "target": null
        },
        {
          "id": "RiskTool.Phpw",
          "display_name": "RiskTool.Phpw",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Trojan.PWS",
          "display_name": "Trojan.PWS",
          "target": null
        },
        {
          "id": "Generic.BitCoinMiner.3",
          "display_name": "Generic.BitCoinMiner.3",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "Gen:NN",
          "display_name": "Gen:NN",
          "target": null
        },
        {
          "id": "Downloader.CertutilURLCache",
          "display_name": "Downloader.CertutilURLCache",
          "target": null
        },
        {
          "id": "Elf",
          "display_name": "Elf",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Kryptik.NRD",
          "display_name": "Kryptik.NRD",
          "target": null
        },
        {
          "id": "Riskware",
          "display_name": "Riskware",
          "target": null
        },
        {
          "id": "Kuluoz.B.gen",
          "display_name": "Kuluoz.B.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.RevengeRat",
          "display_name": "Gen:Variant.RevengeRat",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "VB.Chronos.7",
          "display_name": "VB.Chronos.7",
          "target": null
        },
        {
          "id": "Kryptik.NOE",
          "display_name": "Kryptik.NOE",
          "target": null
        },
        {
          "id": "HEUR:WebToolbar.Generic",
          "display_name": "HEUR:WebToolbar.Generic",
          "target": null
        },
        {
          "id": "Gen:Variant.Barys",
          "display_name": "Gen:Variant.Barys",
          "target": null
        },
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Gen:Variant.Graftor",
          "display_name": "Gen:Variant.Graftor",
          "target": null
        },
        {
          "id": "Backdoor.Agent",
          "display_name": "Backdoor.Agent",
          "target": null
        },
        {
          "id": "Unsafe",
          "display_name": "Unsafe",
          "target": null
        },
        {
          "id": "Trojan.PHP.Agent",
          "display_name": "Trojan.PHP.Agent",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Generic",
          "display_name": "HEUR:Exploit.Generic",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMALYM",
          "display_name": "Ransom_WCRY.SMALYM",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMJ",
          "display_name": "Ransom_WCRY.SMJ",
          "target": null
        },
        {
          "id": "Auslogics",
          "display_name": "Auslogics",
          "target": null
        },
        {
          "id": "Gen:Variant.Jaiko",
          "display_name": "Gen:Variant.Jaiko",
          "target": null
        },
        {
          "id": "Exploit.W32.Agent",
          "display_name": "Exploit.W32.Agent",
          "target": null
        },
        {
          "id": "Trojan.Cud.Gen",
          "display_name": "Trojan.Cud.Gen",
          "target": null
        },
        {
          "id": "Trojan.DOC.Downloader",
          "display_name": "Trojan.DOC.Downloader",
          "target": null
        },
        {
          "id": "Backdoor.MSIL.Agent",
          "display_name": "Backdoor.MSIL.Agent",
          "target": null
        },
        {
          "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Kazy",
          "display_name": "Gen:Variant.Kazy",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Ransom.WannaCrypt",
          "display_name": "Ransom.WannaCrypt",
          "target": null
        },
        {
          "id": "Generic.ServStart.A",
          "display_name": "Generic.ServStart.A",
          "target": null
        },
        {
          "id": "Trojan.Wanna",
          "display_name": "Trojan.Wanna",
          "target": null
        },
        {
          "id": "Generic.MSIL.Bladabindi",
          "display_name": "Generic.MSIL.Bladabindi",
          "target": null
        },
        {
          "id": "TROJ_GEN.R002C0OG518",
          "display_name": "TROJ_GEN.R002C0OG518",
          "target": null
        },
        {
          "id": "Trojan.Chapak",
          "display_name": "Trojan.Chapak",
          "target": null
        },
        {
          "id": "Indiloadz.BB",
          "display_name": "Indiloadz.BB",
          "target": null
        },
        {
          "id": "BehavBehavesLike.PUPXBI",
          "display_name": "BehavBehavesLike.PUPXBI",
          "target": null
        },
        {
          "id": "DeepScan:Generic.SpyAgent.6",
          "display_name": "DeepScan:Generic.SpyAgent.6",
          "target": null
        },
        {
          "id": "Python.KeyLogger",
          "display_name": "Python.KeyLogger",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Generic.MSIL.PasswordStealer",
          "display_name": "Generic.MSIL.PasswordStealer",
          "target": null
        },
        {
          "id": "PSW.Agent",
          "display_name": "PSW.Agent",
          "target": null
        },
        {
          "id": "malicious.8c45ba",
          "display_name": "malicious.8c45ba",
          "target": null
        },
        {
          "id": "Dropper.Binder",
          "display_name": "Dropper.Binder",
          "target": null
        },
        {
          "id": "Constructor.MSIL",
          "display_name": "Constructor.MSIL",
          "target": null
        },
        {
          "id": "Linux.Agent",
          "display_name": "Linux.Agent",
          "target": null
        },
        {
          "id": "Virus.3DMax.Script",
          "display_name": "Virus.3DMax.Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Application.SearchProtect",
          "display_name": "Application.SearchProtect",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Faceliker.A",
          "display_name": "Faceliker.A",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Faceliker",
          "display_name": "JS:Trojan.JS.Faceliker",
          "target": null
        },
        {
          "id": "Constructor.MSIL  Linux.Agent",
          "display_name": "Constructor.MSIL  Linux.Agent",
          "target": null
        },
        {
          "id": "PowerShell.Trojan",
          "display_name": "PowerShell.Trojan",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "Injector.CLDS",
          "display_name": "Injector.CLDS",
          "target": null
        },
        {
          "id": "VB.Downloader.2",
          "display_name": "VB.Downloader.2",
          "target": null
        },
        {
          "id": "malicious.3e78cc",
          "display_name": "malicious.3e78cc",
          "target": null
        },
        {
          "id": "malicious.d800d6",
          "display_name": "malicious.d800d6",
          "target": null
        },
        {
          "id": "VB.PwShell.2",
          "display_name": "VB.PwShell.2",
          "target": null
        },
        {
          "id": "Backdoor.RBot",
          "display_name": "Backdoor.RBot",
          "target": null
        },
        {
          "id": "malicious.71b1a8",
          "display_name": "malicious.71b1a8",
          "target": null
        },
        {
          "id": "TrojanSpy.KeyLogger",
          "display_name": "TrojanSpy.KeyLogger",
          "target": null
        },
        {
          "id": "Injector.JDO",
          "display_name": "Injector.JDO",
          "target": null
        },
        {
          "id": "Heur.Msword.Gen",
          "display_name": "Heur.Msword.Gen",
          "target": null
        },
        {
          "id": "PSW.Discord",
          "display_name": "PSW.Discord",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "HEUR:AdWare.StartSurf",
          "display_name": "HEUR:AdWare.StartSurf",
          "target": null
        },
        {
          "id": "Gen:Heur.NoobyProtect",
          "display_name": "Gen:Heur.NoobyProtect",
          "target": null
        },
        {
          "id": "CIL.HeapOverride",
          "display_name": "CIL.HeapOverride",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Tasker",
          "display_name": "HEUR:Trojan.Tasker",
          "target": null
        },
        {
          "id": "XLM.Trojan.Abracadabra.27",
          "display_name": "XLM.Trojan.Abracadabra.27",
          "target": null
        },
        {
          "id": "HEUR:Backdoor.MSIL.NanoBot",
          "display_name": "HEUR:Backdoor.MSIL.NanoBot",
          "target": null
        },
        {
          "id": "Trojan.PSW.Mimikatz",
          "display_name": "Trojan.PSW.Mimikatz",
          "target": null
        },
        {
          "id": "TrojanSpy.Python",
          "display_name": "TrojanSpy.Python",
          "target": null
        },
        {
          "id": "Trojan.Ole2.Vbs",
          "display_name": "Trojan.Ole2.Vbs",
          "target": null
        },
        {
          "id": "Exploit.MSOffice",
          "display_name": "Exploit.MSOffice",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.AmnesiaE",
          "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
          "target": null
        },
        {
          "id": "Wacatac.D6",
          "display_name": "Wacatac.D6",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "Packed.NetSeal",
          "display_name": "Packed.NetSeal",
          "target": null
        },
        {
          "id": "Trojan.MSIL.Injector",
          "display_name": "Trojan.MSIL.Injector",
          "target": null
        },
        {
          "id": "Trojan.PWS.Agent",
          "display_name": "Trojan.PWS.Agent",
          "target": null
        },
        {
          "id": "TScope.Trojan",
          "display_name": "TScope.Trojan",
          "target": null
        },
        {
          "id": "PSW.Stealer",
          "display_name": "PSW.Stealer",
          "target": null
        },
        {
          "id": "Trojan.PackedNET",
          "display_name": "Trojan.PackedNET",
          "target": null
        },
        {
          "id": "Trojan.Java",
          "display_name": "Trojan.Java",
          "target": null
        },
        {
          "id": "MalwareX",
          "display_name": "MalwareX",
          "target": null
        },
        {
          "id": "Trojan.PSW.Python",
          "display_name": "Trojan.PSW.Python",
          "target": null
        },
        {
          "id": "malicious.11abfc",
          "display_name": "malicious.11abfc",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSIL.Tasker",
          "display_name": "HEUR:Trojan.MSIL.Tasker",
          "target": null
        },
        {
          "id": "PossibleThreat.PALLAS",
          "display_name": "PossibleThreat.PALLAS",
          "target": null
        },
        {
          "id": "Backdoor.Poison",
          "display_name": "Backdoor.Poison",
          "target": null
        },
        {
          "id": "Generic.MSIL.LimeRAT",
          "display_name": "Generic.MSIL.LimeRAT",
          "target": null
        },
        {
          "id": "PWS-FCZZ",
          "display_name": "PWS-FCZZ",
          "target": null
        },
        {
          "id": "Trojan.Script",
          "display_name": "Trojan.Script",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Trojan.PWS.Growtopia",
          "display_name": "Trojan.PWS.Growtopia",
          "target": null
        },
        {
          "id": "Spyware.Bobik",
          "display_name": "Spyware.Bobik",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Hack.Patcher",
          "display_name": "Hack.Patcher",
          "target": null
        },
        {
          "id": "PWS.p",
          "display_name": "PWS.p",
          "target": null
        },
        {
          "id": "Suppobox",
          "display_name": "Suppobox",
          "target": null
        },
        {
          "id": "index.php",
          "display_name": "index.php",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "SmokeLoader",
          "display_name": "SmokeLoader",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.SAgent",
          "display_name": "HEUR:Trojan.MSOffice.SAgent",
          "target": null
        },
        {
          "id": "Script.INF",
          "display_name": "Script.INF",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Likejack",
          "display_name": "JS:Trojan.JS.Likejack",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "Trojan.JS.Agent",
          "display_name": "Trojan.JS.Agent",
          "target": null
        },
        {
          "id": "APT Notes",
          "display_name": "APT Notes",
          "target": null
        },
        {
          "id": "susp.rtf.objupdate",
          "display_name": "susp.rtf.objupdate",
          "target": null
        },
        {
          "id": "RedCap.zoohz",
          "display_name": "RedCap.zoohz",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "virus.office.qexvmc",
          "display_name": "virus.office.qexvmc",
          "target": null
        },
        {
          "id": "Trojan.KillProc",
          "display_name": "Trojan.KillProc",
          "target": null
        },
        {
          "id": "Generic.MSIL.GrwtpStealer.1",
          "display_name": "Generic.MSIL.GrwtpStealer.1",
          "target": null
        },
        {
          "id": "Suspicious.Cloud",
          "display_name": "Suspicious.Cloud",
          "target": null
        },
        {
          "id": "PowerShell.DownLoader",
          "display_name": "PowerShell.DownLoader",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "AGEN.1030939",
          "display_name": "AGEN.1030939",
          "target": null
        },
        {
          "id": "HackTool.Binder",
          "display_name": "HackTool.Binder",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "Dldr.Agent",
          "display_name": "Dldr.Agent",
          "target": null
        },
        {
          "id": "Dropper.MSIL",
          "display_name": "Dropper.MSIL",
          "target": null
        },
        {
          "id": "Trojan.VBKryjetor",
          "display_name": "Trojan.VBKryjetor",
          "target": null
        },
        {
          "id": "PWSX",
          "display_name": "PWSX",
          "target": null
        },
        {
          "id": "VB:Trojan.VBA.Agent",
          "display_name": "VB:Trojan.VBA.Agent",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Stratos",
          "display_name": "HEUR:Trojan.MSOffice.Stratos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1454",
          "name": "Malicious SMS Message",
          "display_name": "T1454 - Malicious SMS Message"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 338,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1184,
        "FileHash-SHA1": 949,
        "FileHash-SHA256": 3712,
        "URL": 2925,
        "domain": 627,
        "hostname": 1319,
        "CVE": 26,
        "email": 8,
        "CIDR": 2
      },
      "indicator_count": 10752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654d29ff31857aafba0358e1",
      "name": "Lucky Mouse APT27 | Feodo Tracker | Malicious Tor Server | Apple iOS",
      "description": "",
      "modified": "2023-12-09T03:01:57.989000",
      "created": "2023-11-09T18:50:39.675000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "communicating",
        "contacted",
        "resolutions",
        "whois record",
        "whois whois",
        "whois parent",
        "whois siblings",
        "skynet",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "million",
        "team",
        "microsoft",
        "back",
        "download",
        "phishing",
        "union",
        "bank",
        "malicious site",
        "blacklist http",
        "exit",
        "traffic",
        "node tcp",
        "tor known",
        "tor relayrouter",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "spammer",
        "malware",
        "dropped",
        "unlocker",
        "http",
        "critical risk",
        "redline stealer",
        "core",
        "hacktool",
        "execution",
        "type win32",
        "exe size",
        "first seen",
        "file name",
        "avast win32",
        "win32",
        "avg win32",
        "fortinet",
        "vitro",
        "mb first",
        "rmndrp",
        "clean mx",
        "undetected dns8",
        "undetected vx",
        "sophos",
        "vault",
        "zdb zeus",
        "cmc threat",
        "snort ip",
        "feodo tracker",
        "cybereason",
        "send bug",
        "pe yandex",
        "no data",
        "tag count",
        "count blacklist",
        "tag tag",
        "algorithm",
        "v3 serial",
        "number",
        "issuer",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "first",
        "seen",
        "valid",
        "no na",
        "no no",
        "ip security",
        "cndst root",
        "ca x3",
        "ca id",
        "research group",
        "cnisrg root",
        "no expired",
        "mozilla",
        "android",
        "malicious red team",
        "tsara brashears",
        "cyber stalking",
        "malvertizing",
        "invasion of privacy",
        "threat",
        "adult content",
        "apple",
        "iphone unlocker",
        "android",
        "exploited spyware",
        "malware host",
        "brute force",
        "revenge-rat",
        "banker",
        "evasive",
        "domain",
        "redline",
        "stealer",
        "phishing",
        "ramnit",
        "unreliable subdomains",
        "dridex",
        "gating",
        "msil",
        "rat",
        "loki",
        "network",
        "hacking",
        "sinkhole",
        "azorult",
        "c2",
        "historicalandnew",
        "targeted attack",
        "puffstealer",
        "rultazo",
        "lokibot",
        "loki pws",
        "burkina",
        "banker,dde,dridex,exploit",
        "banker,dridex,evasive",
        "trickbot",
        "ransomware,torrentlocker",
        "exploit_source",
        "blacknet",
        "FileRepMalware",
        "linux agent",
        "blacknet",
        "ios",
        "phishing paypal",
        "tagging",
        "defacement",
        "hit",
        "bounty",
        "phishing site",
        "malware site",
        "malware download",
        "endangerment",
        "Malicious domain - SANS Internet Storm Center",
        "evasive,msil,rat,revenge-rat",
        "prism_setting",
        "prism_object",
        "static engine",
        "social engineering",
        "jansky",
        "worm",
        "network rat",
        "networm",
        "Loki Password Stealer (PWS)",
        "South Carolina Federal Credit Union phishing",
        "darkweb",
        "yandex",
        "redirectors",
        "blacknet threats",
        "phishing,ransomware,sinkhole",
        "wanacrypt0r,wannacry,wcry",
        "tor c++",
        "tor c++ client",
        "python user",
        "js user",
        "hacker",
        "hijacker",
        "heur",
        "maltiverse",
        "alexa top",
        "exploit",
        "riskware",
        "unsafe",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de indicators",
        "domains",
        "hashes",
        "__convergedlogin_pcustomizationloader_44b450e8d543eb53930d",
        "malicious url",
        "financial",
        "blacknet rat",
        "azorult",
        "stealer",
        "deep scan",
        "blacklist https",
        "referrer",
        "collections kp",
        "incident ip",
        "sneaky server",
        "replacement",
        "unauthorized",
        "emotet",
        "noname057",
        "generic malware",
        "engineering",
        "cyber threat",
        "facebook",
        "paypal",
        "dropbox",
        "united",
        "america",
        "banking",
        "wells fargo",
        "steam",
        "twitter",
        "sliver",
        "daum",
        "swift",
        "runescape",
        "betabot",
        "district",
        "iframe",
        "alexa",
        "downldr",
        "agent",
        "presenoker",
        "bladabindi",
        "live",
        "conduit",
        "pony",
        "covid19",
        "malicious",
        "cobalt strike",
        "suppobox",
        "ramnit",
        "meterpreter",
        "virut",
        "njrat",
        "pykspa",
        "asyncrat",
        "downloader",
        "fakealert",
        "binder",
        "virustotal",
        "formbook",
        "necurs",
        "trojan",
        "msil",
        "hiloti",
        "vawtrak",
        "simda",
        "kraken",
        "solimba",
        "icedid",
        "redirector",
        "suspic",
        "amadey",
        "raccoon",
        "nanocore rat",
        "revenge rat",
        "genkryptik",
        "fuery",
        "wacatac",
        "service",
        "cloudeye",
        "tinba",
        "domaiq",
        "ave maria",
        "zeus",
        "ransomware",
        "zbot",
        "generic",
        "trojanspy",
        "states",
        "inmortal",
        "locky",
        "strike",
        "china cobalt",
        "keybase",
        "cutwail",
        "citadel",
        "radamant",
        "kovter",
        "bradesco",
        "nymaim",
        "amonetize",
        "bondat",
        "ghost rat",
        "vjw0rm",
        "bandoo",
        "matsnu",
        "dnspionage",
        "darkgate",
        "vidar",
        "keylogger",
        "remcos",
        "agenttesla",
        "detplock",
        "win64",
        "smokeloader",
        "agent tesla",
        "kgs0",
        "kls0",
        "urls",
        "type name",
        "dns replication",
        "date",
        "domain",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "drpsuinstaller",
        "vdfsurfs",
        "opera",
        "icwrmind",
        "notepad",
        "installer",
        "miner",
        "unknown",
        "networm",
        "houdini",
        "quasar rat",
        "gamehack",
        "dbatloader",
        "qakbot",
        "ursnif",
        "CVE-2005-1790",
        "CVE-2009-3672",
        "CVE-2010-3962",
        "CVE-2012-3993",
        "CVE-2014-6332",
        "CVE-2017-11882",
        "CVE-2020-0601",
        "CVE-2020-0674",
        "hallrender.com",
        "brian sabey",
        "insurance",
        "botnetwork",
        "botmaster",
        "command_and_control",
        "CVE-2021-27065",
        "CVE-2021-40444",
        "CVE-2023-4966",
        "CVE-2017-0199",
        "CVE-2018-4893",
        "CVE-2010-3333",
        "CVE-2015-1641",
        "CVE-2017-0147",
        "CVE-2017-8570",
        "CVE-2018-0802",
        "CVE-2018-8373",
        "CVE-2017-8759",
        "CVE-2018-8453",
        "CVE-2014-3153",
        "CVE-2015-1650",
        "CVE-2017-0143",
        "CVE-2017-8464",
        "Icefog",
        "Delf.NBX",
        "$WebWatson",
        "Gen:Heur.Ransom.HiddenTears",
        "mobilekey.pw",
        "bitbucket.org",
        "Anomalous.100%",
        "malware distribution site",
        "gootkit",
        "edsaid",
        "rightsaided",
        "betabot",
        "cobaltstrike4.tk",
        "mas.to",
        "BehavesLike.YahLover",
        "srdvd16010404",
        "languageenu",
        "buildno",
        "channelisales",
        "vendorname2581",
        "osregion",
        "device",
        "systemlocale",
        "majorver16",
        "quasar",
        "find",
        "lockbit",
        "chaos",
        "ransomexx",
        "grandoreiro",
        "evilnum",
        "banker"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/6765f47ea77c8274c8e4973ed95aedf59e75998c62f6029e23c58cdf36ed85ba/654afdbdc621e7037801cce7",
        "20.99.186.246 exploit source",
        "fp2e7a.wpc.2be4.phicdn.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing, ELF, Prism.exe found)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian (password cracker)",
        "http://182.22.25.124:7878/182.22.25.124:443     (malicious dropper)",
        "init.ess.apple.com         (malicious code script)",
        "https://www.pornhub.com/video/search?search=tsara+brashears (Malicious PW cracker | stylebk.css stylesheets - not found )",
        "https://urlscan.io/result/a328d9ff-fb49-4078-960d-a757fd41404f/#indicators",
        "VirusTotal Link: https://www.virustotal.com/gui/ip-address/20.99.186.246/detection",
        "Abuse IPDB Link: https://www.abuseipdb.com/check/20.99.186.246",
        "IPv4 45.12.253.72.            command_and_control",
        "Hostname: ddos.dnsnb8.net                        command_and_control",
        "IPv4 95.213.186.51              command_and_control",
        "Hostname: www.supernetforme.com      command_and_control",
        "IPv4 103.224.182.246        command_and_control",
        "IPv4 72.251.233.245           command_and_control",
        "IPv4 63.251.106.25             command_and_control",
        "IPv4 45.15.156.208            command_and_control",
        "IPv4 104.247.81.51             command_and_control",
        "http://ambisexual.phone-sex-blogs.com/http:/ambisexual.phone-sex-blogs.com/images/thumbnails/pic118.jpg             (phishing)",
        "https://downloaddevtools.ir/     (phishing)",
        "happylifehappywife.com",
        "apples.encryptedwork.com        (Interesting in the blacknet)",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635.                   (iOS unlocker and hijacker)",
        "https://www.anyxxxtube.net/media/favicon/apple              (password cracker and iOS hijacker)",
        "https://www.apple.com/shop/browse/open/country_selector     (exploit)",
        "www.norad.mil   (federal tracking tool used by attorneys, law firms, and private investigators 'licensed or unlicensed') hi!",
        "http://init-p01st.push.apple.com/bag            (malicious web creator)",
        "opencve.djgummikuh.de        (CVE dispensary)",
        "Maltiverse Research Team",
        "URLscan.io",
        "Deep Research",
        "Hybrid Analysis",
        "URLhaus Abuse.ch",
        "Cyber Threat Coalition",
        "ThreatFox Abuse.ch"
      ],
      "public": 1,
      "adversary": "Lucky Mouse APT27 | NoName057(16) |  Unnamed",
      "targeted_countries": [
        "United States of America",
        "France",
        "Spain"
      ],
      "malware_families": [
        {
          "id": "Feodo",
          "display_name": "Feodo",
          "target": null
        },
        {
          "id": "Dridex",
          "display_name": "Dridex",
          "target": null
        },
        {
          "id": "Redline Stealer",
          "display_name": "Redline Stealer",
          "target": null
        },
        {
          "id": "Ramnit.N",
          "display_name": "Ramnit.N",
          "target": null
        },
        {
          "id": "Loki Bot",
          "display_name": "Loki Bot",
          "target": null
        },
        {
          "id": "Loki Password Stealer (PWS)",
          "display_name": "Loki Password Stealer (PWS)",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Zbd Zeus",
          "display_name": "Zbd Zeus",
          "target": null
        },
        {
          "id": "Trojan:MSIL/Burkina",
          "display_name": "Trojan:MSIL/Burkina",
          "target": "/malware/Trojan:MSIL/Burkina"
        },
        {
          "id": "Generic.TrickBot.1",
          "display_name": "Generic.TrickBot.1",
          "target": null
        },
        {
          "id": "Exploit.CVE",
          "display_name": "Exploit.CVE",
          "target": null
        },
        {
          "id": "Injector.IS.gen",
          "display_name": "Injector.IS.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Razy",
          "display_name": "Gen:Variant.Razy",
          "target": null
        },
        {
          "id": "Trojan.Androm.Gen",
          "display_name": "Trojan.Androm.Gen",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Linux.Agent",
          "display_name": "HEUR:Trojan.Linux.Agent",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "VBA.Downloader",
          "display_name": "VBA.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Notifier",
          "display_name": "Trojan.Notifier",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Alien",
          "display_name": "HEUR:Trojan.MSOffice.Alien",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_100%",
          "display_name": "Unsafe.AI_Score_100%",
          "target": null
        },
        {
          "id": "Gen:Variant.Johnnie",
          "display_name": "Gen:Variant.Johnnie",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan:Python/Downldr",
          "display_name": "Trojan:Python/Downldr",
          "target": "/malware/Trojan:Python/Downldr"
        },
        {
          "id": "Trojan:Linux/Downldr",
          "display_name": "Trojan:Linux/Downldr",
          "target": "/malware/Trojan:Linux/Downldr"
        },
        {
          "id": "Trojan:VBA/Downldr",
          "display_name": "Trojan:VBA/Downldr",
          "target": "/malware/Trojan:VBA/Downldr"
        },
        {
          "id": "TrojanDownloader:Linux/Downldr",
          "display_name": "TrojanDownloader:Linux/Downldr",
          "target": "/malware/TrojanDownloader:Linux/Downldr"
        },
        {
          "id": "Kryptik.FPH.gen",
          "display_name": "Kryptik.FPH.gen",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Phish.JAT",
          "display_name": "Phish.JAT",
          "target": null
        },
        {
          "id": "Phishing.HTML",
          "display_name": "Phishing.HTML",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "Phish.AB",
          "display_name": "Phish.AB",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "ml.Generic",
          "display_name": "ml.Generic",
          "target": null
        },
        {
          "id": "Xegumumune.8596c22f",
          "display_name": "Xegumumune.8596c22f",
          "target": null
        },
        {
          "id": "Generic.Malware.SMYB",
          "display_name": "Generic.Malware.SMYB",
          "target": null
        },
        {
          "id": "malicious.moderate.ml",
          "display_name": "malicious.moderate.ml",
          "target": null
        },
        {
          "id": "Agent.NBAE",
          "display_name": "Agent.NBAE",
          "target": null
        },
        {
          "id": "AGEN.1045227",
          "display_name": "AGEN.1045227",
          "target": null
        },
        {
          "id": "Riskware.Agent",
          "display_name": "Riskware.Agent",
          "target": null
        },
        {
          "id": "Gen:Variant.Cerbu",
          "display_name": "Gen:Variant.Cerbu",
          "target": null
        },
        {
          "id": "IL:Trojan.MSILZilla",
          "display_name": "IL:Trojan.MSILZilla",
          "target": null
        },
        {
          "id": "Dropped:Generic.Ransom.DMR",
          "display_name": "Dropped:Generic.Ransom.DMR",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Trojan.Heur",
          "display_name": "Trojan.Heur",
          "target": null
        },
        {
          "id": "Trojan.Malware.300983",
          "display_name": "Trojan.Malware.300983",
          "target": null
        },
        {
          "id": "SdBot.CAOC",
          "display_name": "SdBot.CAOC",
          "target": null
        },
        {
          "id": "Trojan.DelShad",
          "display_name": "Trojan.DelShad",
          "target": null
        },
        {
          "id": "Exploit CVE-2017-11882",
          "display_name": "Exploit CVE-2017-11882",
          "target": null
        },
        {
          "id": "GameHack.NL",
          "display_name": "GameHack.NL",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink",
          "display_name": "JS:Trojan.HideLink",
          "target": null
        },
        {
          "id": "Script.Agent",
          "display_name": "Script.Agent",
          "target": null
        },
        {
          "id": "Macro.Agent",
          "display_name": "Macro.Agent",
          "target": null
        },
        {
          "id": "Macro.Downloader.AMIP",
          "display_name": "Macro.Downloader.AMIP",
          "target": null
        },
        {
          "id": "Trojan.VBA",
          "display_name": "Trojan.VBA",
          "target": null
        },
        {
          "id": "HEUR.VBA.Trojan",
          "display_name": "HEUR.VBA.Trojan",
          "target": null
        },
        {
          "id": "VB.EmoooDldr.10",
          "display_name": "VB.EmoooDldr.10",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Packed-GV",
          "display_name": "Packed-GV",
          "target": null
        },
        {
          "id": "Adware.InstallMonetizer",
          "display_name": "Adware.InstallMonetizer",
          "target": null
        },
        {
          "id": "Skynet",
          "display_name": "Skynet",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Zpevdo.B",
          "display_name": "Zpevdo.B",
          "target": null
        },
        {
          "id": "Presenoker",
          "display_name": "Presenoker",
          "target": null
        },
        {
          "id": "SGeneric",
          "display_name": "SGeneric",
          "target": null
        },
        {
          "id": "GameHack.DOM",
          "display_name": "GameHack.DOM",
          "target": null
        },
        {
          "id": "BehavesLike.Ransom",
          "display_name": "BehavesLike.Ransom",
          "target": null
        },
        {
          "id": "CIL.StupidCryptor",
          "display_name": "CIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.MSIL",
          "display_name": "Gen:Heur.Ransom.MSIL",
          "target": null
        },
        {
          "id": "Black.Gen2",
          "display_name": "Black.Gen2",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Trojan.HTML.PHISH",
          "display_name": "Trojan.HTML.PHISH",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Program.Unwanted",
          "display_name": "Program.Unwanted",
          "target": null
        },
        {
          "id": "HEUR/QVM42.3.72EB.Malware",
          "display_name": "HEUR/QVM42.3.72EB.Malware",
          "target": null
        },
        {
          "id": "suspicious.low.ml",
          "display_name": "suspicious.low.ml",
          "target": null
        },
        {
          "id": "JS:Trojan.Cryxos",
          "display_name": "JS:Trojan.Cryxos",
          "target": null
        },
        {
          "id": "Suspicious_GEN.F47V0520",
          "display_name": "Suspicious_GEN.F47V0520",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Generic",
          "display_name": "Dropper.Trojan.Generic",
          "target": null
        },
        {
          "id": "Trojan.TrickBot",
          "display_name": "Trojan.TrickBot",
          "target": null
        },
        {
          "id": "Malware.Tk.Generic",
          "display_name": "Malware.Tk.Generic",
          "target": null
        },
        {
          "id": "TrojanSpy.Java",
          "display_name": "TrojanSpy.Java",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "BehavesLike.Exploit",
          "display_name": "BehavesLike.Exploit",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34128",
          "display_name": "Gen:NN.ZemsilF.34128",
          "target": null
        },
        {
          "id": "Wacapew.C",
          "display_name": "Wacapew.C",
          "target": null
        },
        {
          "id": "Trojan.Malware.121218",
          "display_name": "Trojan.Malware.121218",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Trojan.Generic",
          "display_name": "Trojan.Generic",
          "target": null
        },
        {
          "id": "W32.Trojan",
          "display_name": "W32.Trojan",
          "target": null
        },
        {
          "id": "BScope.Riskware",
          "display_name": "BScope.Riskware",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147",
          "display_name": "Ransom:Win32/CVE-2017-0147",
          "target": "/malware/Ransom:Win32/CVE-2017-0147"
        },
        {
          "id": "Virus.Ramnit",
          "display_name": "Virus.Ramnit",
          "target": null
        },
        {
          "id": "Virus.Virut",
          "display_name": "Virus.Virut",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "AGEN.1141126",
          "display_name": "AGEN.1141126",
          "target": null
        },
        {
          "id": "W32.AIDetect",
          "display_name": "W32.AIDetect",
          "target": null
        },
        {
          "id": "Trojan.Python",
          "display_name": "Trojan.Python",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "Suspicious.Save",
          "display_name": "Suspicious.Save",
          "target": null
        },
        {
          "id": "Adware.Downware",
          "display_name": "Adware.Downware",
          "target": null
        },
        {
          "id": "Ransom.Win64.Wacatac.oa",
          "display_name": "Ransom.Win64.Wacatac.oa",
          "target": null
        },
        {
          "id": "OpenSubtitles.A",
          "display_name": "OpenSubtitles.A",
          "target": null
        },
        {
          "id": "VB.EmoDldr.4",
          "display_name": "VB.EmoDldr.4",
          "target": null
        },
        {
          "id": "Gen:Variant.Midie",
          "display_name": "Gen:Variant.Midie",
          "target": null
        },
        {
          "id": "HEUR/QVM41.2.DA9B.Malware",
          "display_name": "HEUR/QVM41.2.DA9B.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Sirefef",
          "display_name": "Gen:Variant.Sirefef",
          "target": null
        },
        {
          "id": "Macro.Trojan.Dropperd",
          "display_name": "Macro.Trojan.Dropperd",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "Redcap.rlhse",
          "display_name": "Redcap.rlhse",
          "target": null
        },
        {
          "id": "Trojan.Trickster",
          "display_name": "Trojan.Trickster",
          "target": null
        },
        {
          "id": "HTML_REDIR.SMR",
          "display_name": "HTML_REDIR.SMR",
          "target": null
        },
        {
          "id": "TROJ_FRS.VSNTFK19",
          "display_name": "TROJ_FRS.VSNTFK19",
          "target": null
        },
        {
          "id": "Hoax.JS.Phish",
          "display_name": "Hoax.JS.Phish",
          "target": null
        },
        {
          "id": "JS:Iframe",
          "display_name": "JS:Iframe",
          "target": null
        },
        {
          "id": "Application.SQLCrack",
          "display_name": "Application.SQLCrack",
          "target": null
        },
        {
          "id": "susp.lnk",
          "display_name": "susp.lnk",
          "target": null
        },
        {
          "id": "QVM201.0.B70B.Malware",
          "display_name": "QVM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Immortal Stealer",
          "display_name": "Immortal Stealer",
          "target": null
        },
        {
          "id": "WebMonitor RAT",
          "display_name": "WebMonitor RAT",
          "target": null
        },
        {
          "id": "Tor - S0183",
          "display_name": "Tor - S0183",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "WannaCryptor",
          "display_name": "WannaCryptor",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.GandCrab5",
          "display_name": "DeepScan:Generic.Ransom.GandCrab5",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "Delf.NBX",
          "display_name": "Delf.NBX",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.32515",
          "display_name": "Gen:NN.ZexaF.32515",
          "target": null
        },
        {
          "id": "FileRepMalware",
          "display_name": "FileRepMalware",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILPerseus",
          "display_name": "Gen:Variant.MSILPerseus",
          "target": null
        },
        {
          "id": "Icefog",
          "display_name": "Icefog",
          "target": null
        },
        {
          "id": "$WebWatson",
          "display_name": "$WebWatson",
          "target": null
        },
        {
          "id": "Agent.AIK.gen",
          "display_name": "Agent.AIK.gen",
          "target": null
        },
        {
          "id": "Agent.AIK.genCIL.StupidCryptor",
          "display_name": "Agent.AIK.genCIL.StupidCryptor",
          "target": null
        },
        {
          "id": "Agent.YPEZ",
          "display_name": "Agent.YPEZ",
          "target": null
        },
        {
          "id": "Application.InnovativSol",
          "display_name": "Application.InnovativSol",
          "target": null
        },
        {
          "id": "Agent.ASO",
          "display_name": "Agent.ASO",
          "target": null
        },
        {
          "id": "S-b748adc5",
          "display_name": "S-b748adc5",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "Kryptik.GUCB",
          "display_name": "Kryptik.GUCB",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Autoit.bimwt",
          "display_name": "Autoit.bimwt",
          "target": null
        },
        {
          "id": "HEUR:Trojan.OLE2.Alien",
          "display_name": "HEUR:Trojan.OLE2.Alien",
          "target": null
        },
        {
          "id": "AGEN.1038489",
          "display_name": "AGEN.1038489",
          "target": null
        },
        {
          "id": "Gen:Variant.Ser.Strictor",
          "display_name": "Gen:Variant.Ser.Strictor",
          "target": null
        },
        {
          "id": "Packed.Themida.Gen",
          "display_name": "Packed.Themida.Gen",
          "target": null
        },
        {
          "id": "AGEN.1043164",
          "display_name": "AGEN.1043164",
          "target": null
        },
        {
          "id": "TrickBot - S0266",
          "display_name": "TrickBot - S0266",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.PornoAsset",
          "display_name": "Trojan.PornoAsset",
          "target": null
        },
        {
          "id": "Ransom.Win64.PORNOASSET.SM1",
          "display_name": "Ransom.Win64.PORNOASSET.SM1",
          "target": null
        },
        {
          "id": "Gen:Variant.Ulise",
          "display_name": "Gen:Variant.Ulise",
          "target": null
        },
        {
          "id": "Trojan.Win64",
          "display_name": "Trojan.Win64",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Pantera.10",
          "display_name": "Heur.BZC.YAX.Pantera.10",
          "target": null
        },
        {
          "id": "malicious.high.ml",
          "display_name": "malicious.high.ml",
          "target": null
        },
        {
          "id": "CVE-2015-1650",
          "display_name": "CVE-2015-1650",
          "target": null
        },
        {
          "id": "Worm.Win64.AutoRun",
          "display_name": "Worm.Win64.AutoRun",
          "target": null
        },
        {
          "id": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "display_name": "AIT.Heur.Cottonmouth.8.78F19BD7",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "Pua.Gen",
          "display_name": "Pua.Gen",
          "target": null
        },
        {
          "id": "Trojan.Downloader.Generic",
          "display_name": "Trojan.Downloader.Generic",
          "target": null
        },
        {
          "id": "Suspected of Trojan.Downloader.gen",
          "display_name": "Suspected of Trojan.Downloader.gen",
          "target": null
        },
        {
          "id": "HEUR:RemoteAdmin.Generic",
          "display_name": "HEUR:RemoteAdmin.Generic",
          "target": null
        },
        {
          "id": "Gen:Heur.Ransom.HiddenTears",
          "display_name": "Gen:Heur.Ransom.HiddenTears",
          "target": null
        },
        {
          "id": "Nemucod.A",
          "display_name": "Nemucod.A",
          "target": null
        },
        {
          "id": "Backdoor.Hupigon",
          "display_name": "Backdoor.Hupigon",
          "target": null
        },
        {
          "id": "Trojan.Starter JS.Iframe",
          "display_name": "Trojan.Starter JS.Iframe",
          "target": null
        },
        {
          "id": "fake ,promethiumm ,strongpity",
          "display_name": "fake ,promethiumm ,strongpity",
          "target": null
        },
        {
          "id": "PUA.Reg1staid",
          "display_name": "PUA.Reg1staid",
          "target": null
        },
        {
          "id": "Malware.Heur_Generic.A",
          "display_name": "Malware.Heur_Generic.A",
          "target": null
        },
        {
          "id": "Bladabindi.Q",
          "display_name": "Bladabindi.Q",
          "target": null
        },
        {
          "id": "W32.eHeur",
          "display_name": "W32.eHeur",
          "target": null
        },
        {
          "id": "malicious.6e0700",
          "display_name": "malicious.6e0700",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "RedCap.vneda",
          "display_name": "RedCap.vneda",
          "target": null
        },
        {
          "id": "Trojan.Indiloadz",
          "display_name": "Trojan.Indiloadz",
          "target": null
        },
        {
          "id": "Trojan.Ekstak",
          "display_name": "Trojan.Ekstak",
          "target": null
        },
        {
          "id": "staticrr.paleokits.net",
          "display_name": "staticrr.paleokits.net",
          "target": null
        },
        {
          "id": "MSIL.Downloader",
          "display_name": "MSIL.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Autoruns.GenericKDS",
          "display_name": "Trojan.Autoruns.GenericKDS",
          "target": null
        },
        {
          "id": "MSIL.Trojan.BSE",
          "display_name": "MSIL.Trojan.BSE",
          "target": null
        },
        {
          "id": "Adload.AD81",
          "display_name": "Adload.AD81",
          "target": null
        },
        {
          "id": "Packed.Asprotect",
          "display_name": "Packed.Asprotect",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34062",
          "display_name": "Gen:NN.ZemsilF.34062",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Agent.pwc",
          "display_name": "Agent.pwc",
          "target": null
        },
        {
          "id": "RiskTool.Phpw",
          "display_name": "RiskTool.Phpw",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Trojan.PWS",
          "display_name": "Trojan.PWS",
          "target": null
        },
        {
          "id": "Generic.BitCoinMiner.3",
          "display_name": "Generic.BitCoinMiner.3",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "Gen:NN",
          "display_name": "Gen:NN",
          "target": null
        },
        {
          "id": "Downloader.CertutilURLCache",
          "display_name": "Downloader.CertutilURLCache",
          "target": null
        },
        {
          "id": "Elf",
          "display_name": "Elf",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Kryptik.NRD",
          "display_name": "Kryptik.NRD",
          "target": null
        },
        {
          "id": "Riskware",
          "display_name": "Riskware",
          "target": null
        },
        {
          "id": "Kuluoz.B.gen",
          "display_name": "Kuluoz.B.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.RevengeRat",
          "display_name": "Gen:Variant.RevengeRat",
          "target": null
        },
        {
          "id": "Gen:Variant.Mikey",
          "display_name": "Gen:Variant.Mikey",
          "target": null
        },
        {
          "id": "VB.Chronos.7",
          "display_name": "VB.Chronos.7",
          "target": null
        },
        {
          "id": "Kryptik.NOE",
          "display_name": "Kryptik.NOE",
          "target": null
        },
        {
          "id": "HEUR:WebToolbar.Generic",
          "display_name": "HEUR:WebToolbar.Generic",
          "target": null
        },
        {
          "id": "Gen:Variant.Barys",
          "display_name": "Gen:Variant.Barys",
          "target": null
        },
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Gen:Variant.Graftor",
          "display_name": "Gen:Variant.Graftor",
          "target": null
        },
        {
          "id": "Backdoor.Agent",
          "display_name": "Backdoor.Agent",
          "target": null
        },
        {
          "id": "Unsafe",
          "display_name": "Unsafe",
          "target": null
        },
        {
          "id": "Trojan.PHP.Agent",
          "display_name": "Trojan.PHP.Agent",
          "target": null
        },
        {
          "id": "Trojan.Agent",
          "display_name": "Trojan.Agent",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Generic",
          "display_name": "HEUR:Exploit.Generic",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMALYM",
          "display_name": "Ransom_WCRY.SMALYM",
          "target": null
        },
        {
          "id": "Ransom_WCRY.SMJ",
          "display_name": "Ransom_WCRY.SMJ",
          "target": null
        },
        {
          "id": "Auslogics",
          "display_name": "Auslogics",
          "target": null
        },
        {
          "id": "Gen:Variant.Jaiko",
          "display_name": "Gen:Variant.Jaiko",
          "target": null
        },
        {
          "id": "Exploit.W32.Agent",
          "display_name": "Exploit.W32.Agent",
          "target": null
        },
        {
          "id": "Trojan.Cud.Gen",
          "display_name": "Trojan.Cud.Gen",
          "target": null
        },
        {
          "id": "Trojan.DOC.Downloader",
          "display_name": "Trojan.DOC.Downloader",
          "target": null
        },
        {
          "id": "Backdoor.MSIL.Agent",
          "display_name": "Backdoor.MSIL.Agent",
          "target": null
        },
        {
          "id": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "display_name": "Gen:Trojan.Heur2.LPTbHW@W64.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Kazy",
          "display_name": "Gen:Variant.Kazy",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Ransom.WannaCrypt",
          "display_name": "Ransom.WannaCrypt",
          "target": null
        },
        {
          "id": "Generic.ServStart.A",
          "display_name": "Generic.ServStart.A",
          "target": null
        },
        {
          "id": "Trojan.Wanna",
          "display_name": "Trojan.Wanna",
          "target": null
        },
        {
          "id": "Generic.MSIL.Bladabindi",
          "display_name": "Generic.MSIL.Bladabindi",
          "target": null
        },
        {
          "id": "TROJ_GEN.R002C0OG518",
          "display_name": "TROJ_GEN.R002C0OG518",
          "target": null
        },
        {
          "id": "Trojan.Chapak",
          "display_name": "Trojan.Chapak",
          "target": null
        },
        {
          "id": "Indiloadz.BB",
          "display_name": "Indiloadz.BB",
          "target": null
        },
        {
          "id": "BehavBehavesLike.PUPXBI",
          "display_name": "BehavBehavesLike.PUPXBI",
          "target": null
        },
        {
          "id": "DeepScan:Generic.SpyAgent.6",
          "display_name": "DeepScan:Generic.SpyAgent.6",
          "target": null
        },
        {
          "id": "Python.KeyLogger",
          "display_name": "Python.KeyLogger",
          "target": null
        },
        {
          "id": "GameHack.CRS",
          "display_name": "GameHack.CRS",
          "target": null
        },
        {
          "id": "Generic.MSIL.PasswordStealer",
          "display_name": "Generic.MSIL.PasswordStealer",
          "target": null
        },
        {
          "id": "PSW.Agent",
          "display_name": "PSW.Agent",
          "target": null
        },
        {
          "id": "malicious.8c45ba",
          "display_name": "malicious.8c45ba",
          "target": null
        },
        {
          "id": "Dropper.Binder",
          "display_name": "Dropper.Binder",
          "target": null
        },
        {
          "id": "Constructor.MSIL",
          "display_name": "Constructor.MSIL",
          "target": null
        },
        {
          "id": "Linux.Agent",
          "display_name": "Linux.Agent",
          "target": null
        },
        {
          "id": "Virus.3DMax.Script",
          "display_name": "Virus.3DMax.Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "Application.SearchProtect",
          "display_name": "Application.SearchProtect",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Faceliker.A",
          "display_name": "Faceliker.A",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Faceliker",
          "display_name": "JS:Trojan.JS.Faceliker",
          "target": null
        },
        {
          "id": "Constructor.MSIL  Linux.Agent",
          "display_name": "Constructor.MSIL  Linux.Agent",
          "target": null
        },
        {
          "id": "PowerShell.Trojan",
          "display_name": "PowerShell.Trojan",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "W32.AIDetectVM",
          "display_name": "W32.AIDetectVM",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "Injector.CLDS",
          "display_name": "Injector.CLDS",
          "target": null
        },
        {
          "id": "VB.Downloader.2",
          "display_name": "VB.Downloader.2",
          "target": null
        },
        {
          "id": "malicious.3e78cc",
          "display_name": "malicious.3e78cc",
          "target": null
        },
        {
          "id": "malicious.d800d6",
          "display_name": "malicious.d800d6",
          "target": null
        },
        {
          "id": "VB.PwShell.2",
          "display_name": "VB.PwShell.2",
          "target": null
        },
        {
          "id": "Backdoor.RBot",
          "display_name": "Backdoor.RBot",
          "target": null
        },
        {
          "id": "malicious.71b1a8",
          "display_name": "malicious.71b1a8",
          "target": null
        },
        {
          "id": "TrojanSpy.KeyLogger",
          "display_name": "TrojanSpy.KeyLogger",
          "target": null
        },
        {
          "id": "Injector.JDO",
          "display_name": "Injector.JDO",
          "target": null
        },
        {
          "id": "Heur.Msword.Gen",
          "display_name": "Heur.Msword.Gen",
          "target": null
        },
        {
          "id": "PSW.Discord",
          "display_name": "PSW.Discord",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "HEUR:AdWare.StartSurf",
          "display_name": "HEUR:AdWare.StartSurf",
          "target": null
        },
        {
          "id": "Gen:Heur.NoobyProtect",
          "display_name": "Gen:Heur.NoobyProtect",
          "target": null
        },
        {
          "id": "CIL.HeapOverride",
          "display_name": "CIL.HeapOverride",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Tasker",
          "display_name": "HEUR:Trojan.Tasker",
          "target": null
        },
        {
          "id": "XLM.Trojan.Abracadabra.27",
          "display_name": "XLM.Trojan.Abracadabra.27",
          "target": null
        },
        {
          "id": "HEUR:Backdoor.MSIL.NanoBot",
          "display_name": "HEUR:Backdoor.MSIL.NanoBot",
          "target": null
        },
        {
          "id": "Trojan.PSW.Mimikatz",
          "display_name": "Trojan.PSW.Mimikatz",
          "target": null
        },
        {
          "id": "TrojanSpy.Python",
          "display_name": "TrojanSpy.Python",
          "target": null
        },
        {
          "id": "Trojan.Ole2.Vbs",
          "display_name": "Trojan.Ole2.Vbs",
          "target": null
        },
        {
          "id": "Exploit.MSOffice",
          "display_name": "Exploit.MSOffice",
          "target": null
        },
        {
          "id": "DeepScan:Generic.Ransom.AmnesiaE",
          "display_name": "DeepScan:Generic.Ransom.AmnesiaE",
          "target": null
        },
        {
          "id": "Wacatac.D6",
          "display_name": "Wacatac.D6",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "Packed.NetSeal",
          "display_name": "Packed.NetSeal",
          "target": null
        },
        {
          "id": "Trojan.MSIL.Injector",
          "display_name": "Trojan.MSIL.Injector",
          "target": null
        },
        {
          "id": "Trojan.PWS.Agent",
          "display_name": "Trojan.PWS.Agent",
          "target": null
        },
        {
          "id": "TScope.Trojan",
          "display_name": "TScope.Trojan",
          "target": null
        },
        {
          "id": "PSW.Stealer",
          "display_name": "PSW.Stealer",
          "target": null
        },
        {
          "id": "Trojan.PackedNET",
          "display_name": "Trojan.PackedNET",
          "target": null
        },
        {
          "id": "Trojan.Java",
          "display_name": "Trojan.Java",
          "target": null
        },
        {
          "id": "MalwareX",
          "display_name": "MalwareX",
          "target": null
        },
        {
          "id": "Trojan.PSW.Python",
          "display_name": "Trojan.PSW.Python",
          "target": null
        },
        {
          "id": "malicious.11abfc",
          "display_name": "malicious.11abfc",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSIL.Tasker",
          "display_name": "HEUR:Trojan.MSIL.Tasker",
          "target": null
        },
        {
          "id": "PossibleThreat.PALLAS",
          "display_name": "PossibleThreat.PALLAS",
          "target": null
        },
        {
          "id": "Backdoor.Poison",
          "display_name": "Backdoor.Poison",
          "target": null
        },
        {
          "id": "Generic.MSIL.LimeRAT",
          "display_name": "Generic.MSIL.LimeRAT",
          "target": null
        },
        {
          "id": "PWS-FCZZ",
          "display_name": "PWS-FCZZ",
          "target": null
        },
        {
          "id": "Trojan.Script",
          "display_name": "Trojan.Script",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Trojan.PWS.Growtopia",
          "display_name": "Trojan.PWS.Growtopia",
          "target": null
        },
        {
          "id": "Spyware.Bobik",
          "display_name": "Spyware.Bobik",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Hack.Patcher",
          "display_name": "Hack.Patcher",
          "target": null
        },
        {
          "id": "PWS.p",
          "display_name": "PWS.p",
          "target": null
        },
        {
          "id": "Suppobox",
          "display_name": "Suppobox",
          "target": null
        },
        {
          "id": "index.php",
          "display_name": "index.php",
          "target": null
        },
        {
          "id": "Packed.VMProtect",
          "display_name": "Packed.VMProtect",
          "target": null
        },
        {
          "id": "SmokeLoader",
          "display_name": "SmokeLoader",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.SAgent",
          "display_name": "HEUR:Trojan.MSOffice.SAgent",
          "target": null
        },
        {
          "id": "Script.INF",
          "display_name": "Script.INF",
          "target": null
        },
        {
          "id": "JS:Trojan.JS.Likejack",
          "display_name": "JS:Trojan.JS.Likejack",
          "target": null
        },
        {
          "id": "SNH:Script [Dropper]",
          "display_name": "SNH:Script [Dropper]",
          "target": null
        },
        {
          "id": "Trojan.JS.Agent",
          "display_name": "Trojan.JS.Agent",
          "target": null
        },
        {
          "id": "APT Notes",
          "display_name": "APT Notes",
          "target": null
        },
        {
          "id": "susp.rtf.objupdate",
          "display_name": "susp.rtf.objupdate",
          "target": null
        },
        {
          "id": "RedCap.zoohz",
          "display_name": "RedCap.zoohz",
          "target": null
        },
        {
          "id": "Trojan.Tasker",
          "display_name": "Trojan.Tasker",
          "target": null
        },
        {
          "id": "virus.office.qexvmc",
          "display_name": "virus.office.qexvmc",
          "target": null
        },
        {
          "id": "Trojan.KillProc",
          "display_name": "Trojan.KillProc",
          "target": null
        },
        {
          "id": "Generic.MSIL.GrwtpStealer.1",
          "display_name": "Generic.MSIL.GrwtpStealer.1",
          "target": null
        },
        {
          "id": "Suspicious.Cloud",
          "display_name": "Suspicious.Cloud",
          "target": null
        },
        {
          "id": "PowerShell.DownLoader",
          "display_name": "PowerShell.DownLoader",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "AGEN.1030939",
          "display_name": "AGEN.1030939",
          "target": null
        },
        {
          "id": "HackTool.Binder",
          "display_name": "HackTool.Binder",
          "target": null
        },
        {
          "id": "Trojan.Inject",
          "display_name": "Trojan.Inject",
          "target": null
        },
        {
          "id": "Dldr.Agent",
          "display_name": "Dldr.Agent",
          "target": null
        },
        {
          "id": "Dropper.MSIL",
          "display_name": "Dropper.MSIL",
          "target": null
        },
        {
          "id": "Trojan.VBKryjetor",
          "display_name": "Trojan.VBKryjetor",
          "target": null
        },
        {
          "id": "PWSX",
          "display_name": "PWSX",
          "target": null
        },
        {
          "id": "VB:Trojan.VBA.Agent",
          "display_name": "VB:Trojan.VBA.Agent",
          "target": null
        },
        {
          "id": "HEUR:Trojan.MSOffice.Stratos",
          "display_name": "HEUR:Trojan.MSOffice.Stratos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1454",
          "name": "Malicious SMS Message",
          "display_name": "T1454 - Malicious SMS Message"
        },
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654c597a4a45c8d84f0b15c1",
      "export_count": 341,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1184,
        "FileHash-SHA1": 949,
        "FileHash-SHA256": 3712,
        "URL": 2925,
        "domain": 627,
        "hostname": 1319,
        "CVE": 26,
        "email": 8,
        "CIDR": 2
      },
      "indicator_count": 10752,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "pythonware.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "pythonware.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638192.5508249
}