{
  "type": "Domain",
  "indicator": "quicktutorial.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/quicktutorial.com",
    "alexa": "http://www.alexa.com/siteinfo/quicktutorial.com",
    "indicator": "quicktutorial.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2287301838,
      "indicator": "quicktutorial.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 18,
      "pulses": [
        {
          "id": "68f80c6bcd3fff3a4f126a68",
          "name": "Sventore \u2022 Agent Tesla Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information ",
          "description": "",
          "modified": "2025-11-20T17:00:05.377000",
          "created": "2025-10-21T22:42:51.657000",
          "tags": [
            "united",
            "urls",
            "domain",
            "files",
            "files ip",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "arial",
            "worm",
            "trojandropper",
            "meta",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "present oct",
            "present jul",
            "present sep",
            "present aug",
            "moved",
            "ip address",
            "error",
            "title",
            "ipv4 add",
            "url analysis",
            "hosting",
            "reverse dns",
            "america flag",
            "name servers",
            "body",
            "a domains",
            "passive dns",
            "welcome",
            "ok server",
            "gmt content",
            "twitter",
            "dynamicloader",
            "write c",
            "medium",
            "myapp",
            "high",
            "host",
            "delphi",
            "write",
            "code",
            "malware",
            "device driver",
            "backdoor",
            "msil",
            "present mar",
            "apanas",
            "regsetvalueexa",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "langturkish",
            "sublangdefault",
            "regdword",
            "persistence",
            "execution",
            "nids",
            "zegost",
            "trojan",
            "win32fugrafa",
            "malwarexgen att",
            "ck ids",
            "t1040",
            "sniffing",
            "location united",
            "united states",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
            "yara rule",
            "search",
            "blobx00x00x00",
            "guard",
            "encrypt",
            "afraid",
            "smartphone",
            "laptop",
            "tablet",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "show technique",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "access att",
            "t1566 phishing",
            "font",
            "pattern match",
            "general",
            "contact",
            "premium",
            "never",
            "core",
            "external system",
            "http header",
            "network traffic",
            "sample",
            "antivirus",
            "systems found",
            "ipurl artifact",
            "network related",
            "sends traffic",
            "http outbound",
            "hostname add",
            "address",
            "registrar",
            "internet ltd",
            "livedomains",
            "creation date",
            "hostname",
            "domain add",
            "modrg",
            "sincpoatia",
            "utf8",
            "appdata",
            "temp",
            "fyfdz",
            "iepgq",
            "trlew",
            "copy",
            "kentuchy",
            "oljnmrfghb",
            "powershell",
            "sabey",
            "sokolove law"
          ],
          "references": [
            "afraid.org | evergreen.afraid.org",
            "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
            "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
            "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
            "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
            "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
            "https://api.strem.io/api/addonCollectionGet%",
            "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
            "aohhpesayw.lawsonengineers.co.",
            "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
            "gitea.neconsside.com  \u2022 http://f7194.vip/login",
            "2012647\tDropbox.com Offsite File Backup in Use",
            "target.dropboxbusiness.com",
            "consolefoundry.date \u2022 http://consolefoundry.date",
            "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Neshta",
              "display_name": "Neshta",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "Zegost",
              "display_name": "Zegost",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            },
            {
              "id": "MalwareX-Gen",
              "display_name": "MalwareX-Gen",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.B",
              "display_name": "Worm:Win32/AutoRun.B",
              "target": "/malware/Worm:Win32/AutoRun.B"
            },
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "Kentuchy",
              "display_name": "Kentuchy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68f7ced2cf17d264b49628bc",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 483,
            "hostname": 1397,
            "URL": 2874,
            "email": 2,
            "FileHash-MD5": 369,
            "FileHash-SHA1": 355,
            "FileHash-SHA256": 1534,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 7021,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "150 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f7ced2cf17d264b49628bc",
          "name": "NIDS - Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information",
          "description": "Multiple malware\u2019s targeting Dropbox & Ebay accounts. Referenced in earlier pukses. Further investigation shows link  found in apps on multiple Apple devices. Afraid. Org  still running & wreaking havoc globally. Currently targets a Music studio in Clear Creek County Co. The signal bounces from Fire station directly to studio gaining full access to everything.\n\nI am very disappointed with the abuses in f the Palantir , Gotham , Foundry products being abused by law firms and Private Investigators.\nIt is very destructive, causing loss, these firms are literally stealing and making money with other people\u2019s intellectual property and tough luck on the actual inventor, artist, writer because they even steal , cancel your insurance or back accounts leaving you unable to make a claim. \n\nGreat discretion should be used to qualify for these tools used to track, terrorize and access private information as well as tarnish the names of civilians , family ,businesses, stalking tracking  known location.",
          "modified": "2025-11-20T17:00:05.377000",
          "created": "2025-10-21T18:20:02.120000",
          "tags": [
            "united",
            "urls",
            "domain",
            "files",
            "files ip",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "arial",
            "worm",
            "trojandropper",
            "meta",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "present oct",
            "present jul",
            "present sep",
            "present aug",
            "moved",
            "ip address",
            "error",
            "title",
            "ipv4 add",
            "url analysis",
            "hosting",
            "reverse dns",
            "america flag",
            "name servers",
            "body",
            "a domains",
            "passive dns",
            "welcome",
            "ok server",
            "gmt content",
            "twitter",
            "dynamicloader",
            "write c",
            "medium",
            "myapp",
            "high",
            "host",
            "delphi",
            "write",
            "code",
            "malware",
            "device driver",
            "backdoor",
            "msil",
            "present mar",
            "apanas",
            "regsetvalueexa",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "langturkish",
            "sublangdefault",
            "regdword",
            "persistence",
            "execution",
            "nids",
            "zegost",
            "trojan",
            "win32fugrafa",
            "malwarexgen att",
            "ck ids",
            "t1040",
            "sniffing",
            "location united",
            "united states",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
            "yara rule",
            "search",
            "blobx00x00x00",
            "guard",
            "encrypt",
            "afraid",
            "smartphone",
            "laptop",
            "tablet",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "show technique",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "access att",
            "t1566 phishing",
            "font",
            "pattern match",
            "general",
            "contact",
            "premium",
            "never",
            "core",
            "external system",
            "http header",
            "network traffic",
            "sample",
            "antivirus",
            "systems found",
            "ipurl artifact",
            "network related",
            "sends traffic",
            "http outbound",
            "hostname add",
            "address",
            "registrar",
            "internet ltd",
            "livedomains",
            "creation date",
            "hostname",
            "domain add",
            "modrg",
            "sincpoatia",
            "utf8",
            "appdata",
            "temp",
            "fyfdz",
            "iepgq",
            "trlew",
            "copy",
            "kentuchy",
            "oljnmrfghb",
            "powershell",
            "sabey",
            "sokolove law"
          ],
          "references": [
            "afraid.org | evergreen.afraid.org",
            "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
            "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
            "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
            "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
            "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
            "https://api.strem.io/api/addonCollectionGet%",
            "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
            "aohhpesayw.lawsonengineers.co.",
            "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
            "gitea.neconsside.com  \u2022 http://f7194.vip/login",
            "2012647\tDropbox.com Offsite File Backup in Use",
            "target.dropboxbusiness.com",
            "consolefoundry.date \u2022 http://consolefoundry.date",
            "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Neshta",
              "display_name": "Neshta",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "Zegost",
              "display_name": "Zegost",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            },
            {
              "id": "MalwareX-Gen",
              "display_name": "MalwareX-Gen",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.B",
              "display_name": "Worm:Win32/AutoRun.B",
              "target": "/malware/Worm:Win32/AutoRun.B"
            },
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "Kentuchy",
              "display_name": "Kentuchy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 483,
            "hostname": 1397,
            "URL": 2874,
            "email": 2,
            "FileHash-MD5": 369,
            "FileHash-SHA1": 355,
            "FileHash-SHA256": 1534,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 7021,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "150 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68eff833ed84ceaf611521d2",
          "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
          "description": "",
          "modified": "2025-10-15T19:38:27.739000",
          "created": "2025-10-15T19:38:27.739000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": "68c73fbd85dfbb4d41006ad1",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "186 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c73fbd85dfbb4d41006ad1",
          "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
          "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
          "modified": "2025-10-14T22:26:18.109000",
          "created": "2025-09-14T22:20:45.617000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68743733a69ce827f6156f5c",
          "name": "W3.org | Google Spy engine | Tracking, Malware Repository | www.W3.org https://www.searchw3.com/ > ww.google.com.uy",
          "description": "",
          "modified": "2025-07-13T22:46:11.685000",
          "created": "2025-07-13T22:46:11.685000",
          "tags": [
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "expired",
            "acceptencoding",
            "html info",
            "title home",
            "tags viewport",
            "trackers google",
            "tag manager",
            "gsddf3d2bzf",
            "historical ssl",
            "referrer",
            "december",
            "formbook",
            "round",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "collection",
            "vt graph",
            "socgholish",
            "blister",
            "hacktool",
            "hiddentear",
            "gootloader",
            "agent tesla",
            "crypto",
            "installer",
            "life",
            "malware",
            "open",
            "korplug",
            "tofsee",
            "date",
            "name servers",
            "status",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse submit",
            "url analysis",
            "files",
            "no data",
            "tag count",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "heur",
            "cisco umbrella",
            "alexa top",
            "million",
            "site",
            "alexa",
            "maltiverse",
            "xcnfe",
            "safe site",
            "phishing",
            "remcos",
            "malicious",
            "miner",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "trojan",
            "detplock",
            "artemis",
            "networm",
            "win64",
            "redline stealer",
            "limerat",
            "venom rat",
            "trojanspy",
            "tld count",
            "png image",
            "jpeg image",
            "rgba",
            "exif standard",
            "tiff image",
            "pattern match",
            "ascii text",
            "united",
            "jfif",
            "sha1",
            "core",
            "general",
            "starfield",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "adobea",
            "daga",
            "as30148 sucuri",
            "td tr",
            "search",
            "span td",
            "as44273 host",
            "creation date",
            "a domains",
            "xtra",
            "meta",
            "back",
            "verdict",
            "domain",
            "aaaa",
            "as15169 google",
            "asnone united",
            "nxdomain",
            "sucuri security",
            "a li",
            "span",
            "class",
            "body",
            "sucuri website",
            "a div",
            "authority",
            "record value",
            "showing",
            "gmt content",
            "x sucuri",
            "high",
            "related pulses",
            "show",
            "guard",
            "entries",
            "win32",
            "west domains",
            "next",
            "ipv4",
            "asnone germany",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "formbook cnc",
            "checkin",
            "found",
            "error",
            "code",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "dock",
            "execution",
            "copy",
            "xport",
            "firewall",
            "body doctype",
            "section",
            "dcrat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "url https",
            "blacklist",
            "cl0p ransomware",
            "zbot",
            "malware site",
            "team memscan",
            "cl0p",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus starizona",
            "cngo daddy",
            "g2 validity",
            "subject public",
            "key info",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net192",
            "net1920000",
            "as174",
            "as3257",
            "sucuri",
            "sucur2",
            "verisign",
            "whois database",
            "server",
            "registrar abuse",
            "icann whois",
            "whois status",
            "registrar iana",
            "form",
            "temple",
            "first",
            "android",
            "win32 exe",
            "html",
            "bobby fischer",
            "office open",
            "detections type",
            "name",
            "pdf dealer",
            "price list",
            "pdf my",
            "crime",
            "taiwan unknown",
            "as3462",
            "as131148 bank",
            "as21342",
            "all search",
            "otx scoreblue",
            "pulse pulses",
            "cname",
            "as22612",
            "as43350 nforce",
            "win32upatre jun",
            "expiration date",
            "hostname",
            "lowfi",
            "date hash",
            "avast avg",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jun",
            "files show",
            "registrar",
            "china unknown",
            "title",
            "network",
            "fakedout threat",
            "urls http",
            "maltiverse safe",
            "malicious url",
            "team",
            "phishtank",
            "services",
            "botnet command",
            "control server",
            "mining",
            "betabot",
            "team malware",
            "engineering",
            "stealer",
            "service",
            "vawtrak",
            "virut",
            "emotet",
            "simda",
            "redline",
            "fri oct",
            "media sharing",
            "known infection source",
            "bot networks",
            "malware",
            "malware repository",
            "spyware"
          ],
          "references": [
            "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
            "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
            "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
            "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
            "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
            "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
            "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
            "IP\u2019s Contacted: 192.124.249.187",
            "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
            "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
            "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6688e0ffb31d4881f3238713",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4080,
            "URL": 11952,
            "hostname": 4638,
            "domain": 4301,
            "FileHash-MD5": 2236,
            "FileHash-SHA1": 1140,
            "CVE": 8,
            "SSLCertFingerprint": 20,
            "email": 8,
            "CIDR": 1
          },
          "indicator_count": 28384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "280 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66804428b487338dc16f70a7",
          "name": "Brian Sabey Orbiting Tsara Brashears and associates | Espionage | Said client: Jeffrey Reimer",
          "description": "Brian Sabey & large team continue excessive orbiting target & family members in multiple states. \nUnwarranted, dangerous and illegal. \nLarge attacks have wreaked havoc on medical establishments, targets medical profile, once profitable business, legal manipulation, financial well being. forced poverty, swatting, imfostealer, insurance fraud, intellectual property use, Audi le spying, in person stalking, confrontations, great bodily harm, loss of peace, safety. basic human rights and privacy, phone call redirection, malvertising. In the name of assaulter Jeffrey Scott Reimer",
          "modified": "2024-11-05T10:00:12.606000",
          "created": "2024-06-29T17:28:08.283000",
          "tags": [
            "unknown",
            "united",
            "virgin islands",
            "as51852",
            "as33387",
            "as19905",
            "as44273 host",
            "cname",
            "nxdomain",
            "passive dns",
            "url http",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "urls",
            "files ip",
            "address domain",
            "ip related",
            "pulses otx",
            "pulses",
            "related tags",
            "indicator facts",
            "dga domain",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "ip address",
            "related nids",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "b59bn timestamp",
            "ff2c217402202b",
            "code",
            "false",
            "url https",
            "domain",
            "trojan",
            "hostname",
            "files",
            "body",
            "date",
            "path max",
            "age86400 set",
            "cookie",
            "script urls",
            "type",
            "mtb may",
            "script script",
            "trojanspy",
            "striven",
            "miles2",
            "rexxfield",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "date sat",
            "gmt server",
            "sakula malware",
            "historical ssl",
            "realteck audio",
            "lemon duck",
            "iocs",
            "tsara brashears",
            "loki password",
            "stealer",
            "windows",
            "auction",
            "metro",
            "core",
            "colibri loader",
            "hacktool",
            "status",
            "for privacy",
            "creation date",
            "record value",
            "name servers",
            "showing",
            "next",
            "mtb mar",
            "ipv4",
            "ransom",
            "west domains",
            "redacted for",
            "gmt location",
            "gmt max",
            "cowboy",
            "encrypt",
            "as60558 phoenix",
            "susp",
            "win32",
            "methodpost",
            "canada unknown",
            "as43350 nforce",
            "united kingdom",
            "as47846",
            "germany unknown",
            "briansabey",
            "body doubles",
            "orbiters",
            "malvertising",
            "cane",
            "get na",
            "show",
            "as16509",
            "delete c",
            "sinkhole cookie",
            "value snkz",
            "cape",
            "possible",
            "copy",
            "nivdort",
            "write",
            "bayrob",
            "malware",
            "exploit",
            "confirm https",
            "impact",
            "misc http",
            "cvss v2",
            "authentication",
            "n cvss",
            "v3 severity",
            "high attack",
            "emails",
            "cnc",
            "alphacrypt cnc",
            "beacon",
            "as15169 google",
            "limited",
            "as8560",
            "elite",
            "AS33387 nocix llc",
            "pegasus",
            "mercenary",
            "cellerebrand",
            "cellebrite",
            "apple",
            "dark",
            "apple ios",
            "ios",
            "apple iphone",
            "apple itunes",
            "itunes",
            "pegasystem",
            "data brokers",
            "hackers",
            "javascript",
            "please",
            "intel",
            "filehash",
            "av detections",
            "xorddos"
          ],
          "references": [
            "http://www.northpoleroute.com/78985064&type=0&resid=5312625",
            "espysite.azurewebsites.net - https://otx.alienvault.com/indicator/hostname/espysite.azurewebsites.net",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256 aa289c89f2cdbfe896f4c77c611d94aa95858797014b57e24d5fe2bb0997d7b0",
            "Ransom:Win32/Haperlock.A: FileHash-MD5 46480bf46cde2b3e79852661cc5c36fc",
            "Ransom:Win32/Haperlock.A: FileHash-SHA1 c881d1434164b35fb16107a25f84995b7fdef37f",
            "Ransom:Win32/Haperlock.A; FileHash-SHA256 8264c73f129d4895573c2375ea4e4636b9d5df66852ce72ccc20d31a96ae7df1",
            "IDS Detections: W32/Bayrob Attempted Checkin 2 Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin",
            "IDS Detections: Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "Alerts: cape_detected_threat cape_extracted_content",
            "https://otx.alienvault.com/indicator/file/251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "\"Windows SMB Information Disclosure Vulnerability.\" - https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA256 4e692806955f9ee3f4c7a5d9a1ac7729eb53b855b39e6f9f943f89ccba30bd49",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA 453355033bb7977831ca87cc90156b594f13b2ee",
            "Backdoor:Win32/Fynloski.A: FileHash-MD5 c3113684e8f8aa6d1b1b67d59141e845",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA256 7456108771e6a8bac658276c1cb9e18c8c348fdd9cd3538419751c3b5ef3ac02",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA1 7a52b57df5b3c67f810a71dc39ff93688b141534",
            "TrojanClicker:Win32/Ellell.A: 4d3e7d486ec5918d91e54e51c4d07dc6",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA256 105834163b1a0c89e12917a3145e14be6030a611e07f7f62fa7c57de838d6251",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA1 57486d33246bce6dfedb0836cd97c9acd4a4a39a",
            "PWS:Win32/Ymacco.AA50: FileHash-MD5 5739cd62eb88e2a7e514784fe7cf5ca4",
            "https://otx.alienvault.com/indicator/ip/162.222.213.199",
            "TrojanDownloader:Win32/PurityScan.MI!MTB: FileHash-SHA1 58ba8715a88d883537ba8d0e20eea2a4d9269cad",
            "Ransom:Win32/Tescrypt: FileHash-SHA256 916e13eb1e4313b2a04a2ae21b4955b8228183b26709a64284098ca759a8f437",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA256 71fa9257f88c15b438616662dc468327199edb570286c7259d333953006b8eec",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA1 fec703ee7c02ffe35c6b987bb9aac3a765e95dfb",
            "PWS:Win32/QQpass.B!MTB: FileHash-MD5 f7c36b4e5b4b09dc369163377aade2d7",
            "Trojan:Win32/Zombie.A: FileHash-SHA256 0b87667251b79cb800ddd88bdabecea8e13248c426d4a14ae0aae0ef5783f943",
            "Trojan:Win32/Zombie.A: FileHash-SHA1 de974c697f0401d681e1bb3c8694a663e9e43d8f",
            "Trojan:Win32/Zombie.A: FileHash-MD5 34e85820b41c14e07dd564f22997e893",
            "Win.Virus.TeslaCrypt3-2: 78af1fd5be62ab829e49f9a1b5fbb8a9b30f8d0804cba5805c8f350b841d522e",
            "IDS Detections : W32/Bayrob Attempted Checkin 2 CryptoWall Check-in AlphaCrypt CnC Beacon 4 Trojan-Ransom.Win32.Blocker.avsx",
            "IDS Detections : AlphaCrypt CnC Beacon 3 MalDoc Request for Payload Aug 17 2016 Koobface W32/Bayrob Attempted Checkin",
            "IDS Detections : Suspicious Accept in HTTP POST - Possible Alphacrypt/TeslaCrypt Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
            "https://otx.alienvault.com/indicator/ip/185.230.63.186",
            "CnC IP's: 192.187.111.221  63.141.242.43  63.141.242.44  63.141.242.46 81.17.18.195  81.17.18.197 81.17.29.146  81.17.29.148",
            "http://islamicsoftwares.com/downloads/iphone/audioCont/2/107.tar.gz http://islamicsoftwares.com/downloads/iphone/audioCont/7/110.tar.gz",
            "smartphonesonline.co.uk  https://smartphonesonline.co.uk/  https://www.smartphonesonline.co.uk/ [192.187.111.222. US - Request HTTP -Target IP]",
            "Mercenary Attackers / Cellebrite branded as: http://teacellertea.com/Pegasus/ NSO",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/ip/63.141.242.45",
            "Yara Detections: is__elf ,  xorddos ,  LinuxXorDDoS_VariantTwo",
            "Antivirus Detections: ELF:Xorddos-AE\\ [Trj] ,  Unix.Trojan.Xorddos-1 ,",
            "Trojan:Linux/Xorddos: FileHash-MD5 3b4ce1333614cd21c109054630e959b9",
            "Trojan:Linux/Xorddos:  FileHash-SHA1 a5780498e6fce5933a7e7bf59a6fa5742e97f559",
            "Trojan:Linux/Xorddos: FileHash-SHA256 0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "Ransom:Win32/Haperlock.A",
              "display_name": "Ransom:Win32/Haperlock.A",
              "target": "/malware/Ransom:Win32/Haperlock.A"
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "TrojanClicker:Win32/Ellell.A",
              "display_name": "TrojanClicker:Win32/Ellell.A",
              "target": "/malware/TrojanClicker:Win32/Ellell.A"
            },
            {
              "id": "Bayrob",
              "display_name": "Bayrob",
              "target": null
            },
            {
              "id": "Win.Virus.TeslaCrypt3-2/Custom",
              "display_name": "Win.Virus.TeslaCrypt3-2/Custom",
              "target": null
            },
            {
              "id": "PWS:Win32/Ymacco.AA50",
              "display_name": "PWS:Win32/Ymacco.AA50",
              "target": "/malware/PWS:Win32/Ymacco.AA50"
            },
            {
              "id": "Ransom:Win32/Tescrypt",
              "display_name": "Ransom:Win32/Tescrypt",
              "target": "/malware/Ransom:Win32/Tescrypt"
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Pegasus for Android - MOB-S0032",
              "display_name": "Pegasus for Android - MOB-S0032",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Trojan:Linux/Xorddos",
              "display_name": "Trojan:Linux/Xorddos",
              "target": "/malware/Trojan:Linux/Xorddos"
            },
            {
              "id": "Sakula RAT",
              "display_name": "Sakula RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 106,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3885,
            "hostname": 1651,
            "URL": 5981,
            "FileHash-MD5": 486,
            "FileHash-SHA256": 3859,
            "SSLCertFingerprint": 2,
            "FileHash-SHA1": 487,
            "CVE": 7,
            "email": 8
          },
          "indicator_count": 16366,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "530 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c08b488620dac7697026c7",
          "name": "Fakefolder | Ransom:Win32/CVE affecting HCA Healthcare cloud",
          "description": "Cloud computing - User Acceptance Testing (UAT)\napparently used by HCA one of the nations leading healthcare providers. It's seems HCA's cloud is compromised. The cloud has a number of high priority vulnerabilities, malware, ransomware, zero day, etc.  Patient accounts aiming involved, (some patients received letters of serious PII, PHI compromise) lost records, patient blacklisting, hacking, and nefarious manipulations by providers. I've been made aware of CORHIO closing compromised patient accounts. Some patients account access and data has reportedly been lost.\n#VirTool:Win32/Obfuscator.ADB\nALF:HeraklezEval:Ransom:Win32/CVE\nRansom:Win32/StopCrypt.AK!MTB\nRansom:Win32/Wannaren.A\nTrojan:Win32/BlackMon\nTrojan:Win32/Fakefolder\nTulach Malware",
          "modified": "2024-10-15T14:02:54.772000",
          "created": "2024-08-17T11:36:40.810000",
          "tags": [
            "microsoft edge",
            "iocs",
            "alberta ndp",
            "security",
            "vc rescue",
            "disk",
            "apple",
            "google",
            "windows",
            "powershell",
            "security https",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "detection list",
            "site",
            "cisco umbrella",
            "alexa top",
            "blacklist",
            "million",
            "mail spammer",
            "firehol",
            "ip address",
            "noname057",
            "anonymizer",
            "firehol proxy",
            "proxy",
            "india mail",
            "malware",
            "full name",
            "first",
            "v3 serial",
            "number",
            "cus odigicert",
            "global tls",
            "rsa4096 sha256",
            "ca1 validity",
            "subject public",
            "key info",
            "dns replication",
            "date",
            "script script",
            "as12912",
            "a domains",
            "a li",
            "poland unknown",
            "t mobile",
            "domains",
            "przejd",
            "passive dns",
            "authority",
            "meta",
            "accept",
            "cname",
            "record type",
            "ttl value",
            "aaaa",
            "poland",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "location poland",
            "asnone united",
            "moved",
            "location",
            "vary",
            "accept encoding",
            "content type",
            "virtool",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "search",
            "date hash",
            "next",
            "showing",
            "as39198",
            "body",
            "window",
            "certificate",
            "hostname",
            "unknown",
            "red bull",
            "script urls",
            "as2828 verizon",
            "ireland unknown",
            "gmt content",
            "as8068",
            "as8075",
            "servers",
            "creation date",
            "united",
            "trojan",
            "trojan features",
            "win32",
            "msr aug",
            "urls",
            "reverse dns",
            "trojandropper",
            "historical ssl",
            "referrer",
            "infiltrate",
            "threat network",
            "malicious",
            "snapchat",
            "eternal blue",
            "sneaky simay",
            "groups",
            "covert",
            "probe",
            "whois lookup",
            "domain name",
            "united",
            "as15169 google",
            "a nxdomain",
            "germany",
            "dynamicloader",
            "yara rule",
            "high",
            "medium",
            "port",
            "dynamic",
            "domain",
            "file name",
            "pcap",
            "copy",
            "url host",
            "port method",
            "user agent",
            "okrnserver",
            "002000",
            "hit tcpmemhit",
            "algorithm",
            "data",
            "cus oentrust",
            "entrust",
            "l1k validity",
            "cpl lwarszawa",
            "ot mobile",
            "status",
            "name servers",
            "as6354",
            "mtb aug",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "info",
            "location united",
            "win32 exe",
            "pe32 executable",
            "ms windows",
            "intel",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "vs2010",
            "info compiler",
            "products",
            "vs2008",
            "header intel",
            "name md5",
            "type",
            "language",
            "ascii text",
            "cyrillic",
            "registrar of",
            "domain names",
            "ii llc",
            "contacted",
            "file type",
            "mb file",
            "graph",
            "ip detections",
            "country",
            "type name",
            "network",
            "tsara brashears",
            "december",
            "typhon reborn",
            "speakez securus",
            "hacktool",
            "emotet",
            "formbook",
            "critical",
            "installer",
            "tofsee",
            "hiddentear",
            "cnc",
            "email collection",
            "apple data",
            "data collection",
            "tsara brashears",
            "for privacy",
            "record value",
            "emails",
            "expiration date",
            "swipper",
            "tulach",
            "aitm",
            "query",
            "observed dns",
            "activity dns",
            "total",
            "google llc",
            "pe32",
            "write",
            "april",
            "defender",
            "otx telemetry",
            "win32cve aug",
            "polska s",
            "copyright",
            "levelblue",
            "dashboard",
            "pulse submit",
            "url analysis",
            "as20940",
            "as16625 akamai",
            "entrustdns",
            "france",
            "entries",
            "refresh",
            "443 ma2592000",
            "net174",
            "net1740000",
            "mcics",
            "read c",
            "write c",
            "tlsv1",
            "default",
            "module load",
            "execution",
            "dock",
            "persistence",
            "xport",
            "redacted for",
            "privacy tech",
            "privacy admin",
            "organization",
            "postal code",
            "stateprovince",
            "server",
            "registrar abuse",
            "code",
            "high priority",
            "critical",
            "CVE-2023-29059"
          ],
          "references": [
            "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe",
            "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
            "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
            "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
            "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
            "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
            "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
            "nr-data.net [Apple Private Data Collection]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
            "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
            "record-viewer-application.hcahealthcare.cloud",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
            "Tulach IP: 114.114.114.114",
            "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
            "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
            "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
            "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
            "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
            "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
            "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
            "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
            "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
            "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/BlackMon",
              "display_name": "Trojan:Win32/BlackMon",
              "target": "/malware/Trojan:Win32/BlackMon"
            },
            {
              "id": "Trojan:Win32/Fakefolder",
              "display_name": "Trojan:Win32/Fakefolder",
              "target": "/malware/Trojan:Win32/Fakefolder"
            },
            {
              "id": "Ransom:Win32/Wannaren.A",
              "display_name": "Ransom:Win32/Wannaren.A",
              "target": "/malware/Ransom:Win32/Wannaren.A"
            },
            {
              "id": "Ransom:Win32/StopCrypt.AK!MTB",
              "display_name": "Ransom:Win32/StopCrypt.AK!MTB",
              "target": "/malware/Ransom:Win32/StopCrypt.AK!MTB"
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Civilian Society",
            "Telecommunications",
            "Networking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1975,
            "FileHash-SHA1": 1731,
            "FileHash-SHA256": 4646,
            "URL": 636,
            "domain": 283,
            "hostname": 798,
            "email": 12,
            "CVE": 3,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 10086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "669e42fea462f0c8f8db32a1",
          "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
          "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
          "modified": "2024-08-21T11:03:59.106000",
          "created": "2024-07-22T11:31:10.391000",
          "tags": [
            "historical ssl",
            "referrer",
            "fancy bear",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "open",
            "status",
            "name servers",
            "creation date",
            "search",
            "proofpoint",
            "expiration date",
            "div div",
            "date",
            "accept",
            "next",
            "united",
            "cname",
            "asnone united",
            "a nxdomain",
            "domain",
            "united kingdom",
            "servers",
            "showing",
            "nxdomain",
            "dname",
            "whitelisted",
            "aaaa",
            "script urls",
            "costa rica",
            "script domains",
            "msie",
            "chrome",
            "unknown",
            "body",
            "gmt content",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "as8987 amazon",
            "as20940",
            "hostname",
            "gartner",
            "crowdstrike",
            "business value",
            "magic quadrant",
            "customer",
            "realized",
            "assessment",
            "economic impact",
            "complete",
            "february",
            "utc na",
            "ver2",
            "msclkidn",
            "html info",
            "meta tags",
            "mobileoptimized",
            "adobe dynamic",
            "tag management",
            "utc bing",
            "cobalt strike",
            "communications",
            "android device",
            "neutral",
            "win32 exe",
            "pe32",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "sections",
            "rticon neutral",
            "ico rtgroupicon",
            "xml rtmanifest",
            "overlay",
            "threat roundup",
            "pandas",
            "attacks against",
            "southeast",
            "wannacry kill",
            "switch dns",
            "query",
            "high level",
            "hackers",
            "unknown win",
            "core",
            "ascii text",
            "sha256",
            "sha1",
            "size",
            "pattern match",
            "suricata stream",
            "command decode",
            "utf8 text",
            "mitre att",
            "path",
            "hybrid",
            "starfield",
            "meta",
            "general",
            "target",
            "local",
            "click",
            "strings",
            "trident",
            "legacy",
            "main",
            "contact",
            "flow t1574",
            "dll sideloading",
            "create",
            "modify system",
            "process t1543",
            "windows service",
            "t1055 system",
            "pe file",
            "t1497 query",
            "may sleep",
            "allocate rwx",
            "get file",
            "access",
            "windows event",
            "allocate",
            "link function",
            "windows link",
            "contains pdb",
            "dns resolutions",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls tcp",
            "hashes",
            "user",
            "file system",
            "written c",
            "samplepath",
            "files dropped",
            "userprofile",
            "registry keys",
            "registry",
            "set registrya",
            "conhost",
            "comspec",
            "created",
            "temp",
            "windows",
            "displayname",
            "process",
            "commands",
            "signals mutexes",
            "mutexes",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "inc validity",
            "subject public",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net148",
            "net1480000",
            "as16509",
            "as22843",
            "as13916",
            "form",
            "server",
            "registrar abuse",
            "email",
            "request email",
            "verisign",
            "icann whois",
            "tech",
            "first",
            "project skynet",
            "cyber army",
            "dynamicloader",
            "high",
            "delete c",
            "show",
            "username",
            "medium",
            "default",
            "yara detections",
            "worm",
            "copy",
            "write",
            "duptwux",
            "malware",
            "x82xd4",
            "kx81xdbx0f",
            "x86xd3",
            "xa1xf1",
            "xe8xc2x14",
            "wx99xcdx11",
            "regsetvalueexa",
            "regbinary",
            "xe8xc6x13",
            "hx88x9ax1e",
            "stream",
            "win32",
            "persistence",
            "execution",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "ftp username",
            "contacted",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "null",
            "refresh",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "robtex",
            "apple ios",
            "apple",
            "domains",
            "co number",
            "virtual mobile",
            "logistics",
            "cyber defense",
            "twitter",
            "read c",
            "artemis",
            "intel",
            "steals",
            "virustotal",
            "python",
            "panda",
            "falcon sandbox",
            "analysis",
            "hybrid analysis",
            "submission name",
            "av detection",
            "multi scan",
            "highest",
            "ability",
            "execute",
            "upgrade",
            "intelligence",
            "learn",
            "reports",
            "logo analysis",
            "size17kib type",
            "command",
            "found",
            "layer protocol",
            "osi application",
            "ip address",
            "t1105 ingress",
            "tool transfer",
            "problems",
            "threat network",
            "infrastructure",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "startpage",
            "e1203 windows",
            "catalog tree",
            "analysis ob0001",
            "b0001 process",
            "b0003 delayed",
            "analysis ob0002",
            "evasion ob0006",
            "ob0007 system",
            "e1082 file",
            "e1083 impact",
            "data manipulation",
            "remote system",
            "discovery",
            "t1059 accept",
            "modules t1129",
            "enumerate",
            "as2914 ntt",
            "access denied",
            "as16625 akamai",
            "germany unknown",
            "csccorpdomains",
            "as31109",
            "invalid url",
            "mirai",
            "port",
            "destination",
            "bad login",
            "suspicious path",
            "nids",
            "tcp syn",
            "root account",
            "cve20185723",
            "as8068",
            "please",
            "x msedge",
            "embeddedwb",
            "windows nt",
            "tofsee",
            "push",
            "as54113",
            "as396982 google",
            "as31898 oracle",
            "moved",
            "encrypt"
          ],
          "references": [
            "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
            "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
            "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
            "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
            "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
            "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
            "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
            "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
            "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
            "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
            "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
            "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
            "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
            "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
            "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
            "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
            "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
            "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
            "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
            "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
            "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
            "http://images.contact.acams.org/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Trojan.Agent.FRYX",
              "display_name": "Trojan.Agent.FRYX",
              "target": null
            },
            {
              "id": "Win32:AceCrypter-B [Cryp]",
              "display_name": "Win32:AceCrypter-B [Cryp]",
              "target": null
            },
            {
              "id": "Mal_Tofsee",
              "display_name": "Mal_Tofsee",
              "target": null
            },
            {
              "id": "Ransom.StopcryptPMF.",
              "display_name": "Ransom.StopcryptPMF.",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Worm:Win32/Ganelp.A",
              "display_name": "Worm:Win32/Ganelp.A",
              "target": "/malware/Worm:Win32/Ganelp.A"
            },
            {
              "id": "trojan.shellrunner/emailworm",
              "display_name": "trojan.shellrunner/emailworm",
              "target": null
            },
            {
              "id": "trojan.redcap/python",
              "display_name": "trojan.redcap/python",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1565",
              "name": "Data Manipulation",
              "display_name": "T1565 - Data Manipulation"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 890,
            "FileHash-SHA1": 853,
            "FileHash-SHA256": 7215,
            "domain": 2771,
            "hostname": 5544,
            "URL": 13393,
            "email": 12,
            "SSLCertFingerprint": 15,
            "CIDR": 1,
            "CVE": 3
          },
          "indicator_count": 30697,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 237,
          "modified_text": "606 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6688e142f0c8f5ddecbc788c",
          "name": "Google Spy engine | Tracking, Malware Repository",
          "description": "www.W3.org https://www.searchw3.com/ >  ww.google.com.uy. All tags auto populated. Did not spend time documenting all as pulse is quite large. I was able to prove the the compromises are active. I will make much smaller reports.\n(Botnet Commands, Google Spy engine | Tracking, Malware Repository, Stealer, iPhone unlocker)",
          "modified": "2024-08-05T04:01:42.283000",
          "created": "2024-07-06T06:16:34.388000",
          "tags": [
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "expired",
            "acceptencoding",
            "html info",
            "title home",
            "tags viewport",
            "trackers google",
            "tag manager",
            "gsddf3d2bzf",
            "historical ssl",
            "referrer",
            "december",
            "formbook",
            "round",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "collection",
            "vt graph",
            "socgholish",
            "blister",
            "hacktool",
            "hiddentear",
            "gootloader",
            "agent tesla",
            "crypto",
            "installer",
            "life",
            "malware",
            "open",
            "korplug",
            "tofsee",
            "date",
            "name servers",
            "status",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse submit",
            "url analysis",
            "files",
            "no data",
            "tag count",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "heur",
            "cisco umbrella",
            "alexa top",
            "million",
            "site",
            "alexa",
            "maltiverse",
            "xcnfe",
            "safe site",
            "phishing",
            "remcos",
            "malicious",
            "miner",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "trojan",
            "detplock",
            "artemis",
            "networm",
            "win64",
            "redline stealer",
            "limerat",
            "venom rat",
            "trojanspy",
            "tld count",
            "png image",
            "jpeg image",
            "rgba",
            "exif standard",
            "tiff image",
            "pattern match",
            "ascii text",
            "united",
            "jfif",
            "sha1",
            "core",
            "general",
            "starfield",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "adobea",
            "daga",
            "as30148 sucuri",
            "td tr",
            "search",
            "span td",
            "as44273 host",
            "creation date",
            "a domains",
            "xtra",
            "meta",
            "back",
            "verdict",
            "domain",
            "aaaa",
            "as15169 google",
            "asnone united",
            "nxdomain",
            "sucuri security",
            "a li",
            "span",
            "class",
            "body",
            "sucuri website",
            "a div",
            "authority",
            "record value",
            "showing",
            "gmt content",
            "x sucuri",
            "high",
            "related pulses",
            "show",
            "guard",
            "entries",
            "win32",
            "west domains",
            "next",
            "ipv4",
            "asnone germany",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "formbook cnc",
            "checkin",
            "found",
            "error",
            "code",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "dock",
            "execution",
            "copy",
            "xport",
            "firewall",
            "body doctype",
            "section",
            "dcrat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "url https",
            "blacklist",
            "cl0p ransomware",
            "zbot",
            "malware site",
            "team memscan",
            "cl0p",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus starizona",
            "cngo daddy",
            "g2 validity",
            "subject public",
            "key info",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net192",
            "net1920000",
            "as174",
            "as3257",
            "sucuri",
            "sucur2",
            "verisign",
            "whois database",
            "server",
            "registrar abuse",
            "icann whois",
            "whois status",
            "registrar iana",
            "form",
            "temple",
            "first",
            "android",
            "win32 exe",
            "html",
            "bobby fischer",
            "office open",
            "detections type",
            "name",
            "pdf dealer",
            "price list",
            "pdf my",
            "crime",
            "taiwan unknown",
            "as3462",
            "as131148 bank",
            "as21342",
            "all search",
            "otx scoreblue",
            "pulse pulses",
            "cname",
            "as22612",
            "as43350 nforce",
            "win32upatre jun",
            "expiration date",
            "hostname",
            "lowfi",
            "date hash",
            "avast avg",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jun",
            "files show",
            "registrar",
            "china unknown",
            "title",
            "network",
            "fakedout threat",
            "urls http",
            "maltiverse safe",
            "malicious url",
            "team",
            "phishtank",
            "services",
            "botnet command",
            "control server",
            "mining",
            "betabot",
            "team malware",
            "engineering",
            "stealer",
            "service",
            "vawtrak",
            "virut",
            "emotet",
            "simda",
            "redline",
            "fri oct",
            "media sharing",
            "known infection source",
            "bot networks",
            "malware",
            "malware repository",
            "spyware"
          ],
          "references": [
            "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
            "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
            "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
            "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
            "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
            "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
            "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
            "IP\u2019s Contacted: 192.124.249.187",
            "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
            "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
            "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 94,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4080,
            "URL": 11952,
            "hostname": 4638,
            "domain": 4301,
            "FileHash-MD5": 2236,
            "FileHash-SHA1": 1140,
            "CVE": 8,
            "SSLCertFingerprint": 20,
            "email": 8,
            "CIDR": 1
          },
          "indicator_count": 28384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "622 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6688e0ffb31d4881f3238713",
          "name": "Google Spy engine | Tracking, Malware Repository",
          "description": "www.W3.org https://www.searchw3.com/ >  ww.google.com.uy. All tags auto populated. Did not spend time documenting all as pulse is quite large. I was able to prove the the compromises are active. I will make much smaller reports.\n(Botnet Commands, Google Spy engine | Tracking, Malware Repository, Stealer, iPhone unlocker)",
          "modified": "2024-08-05T04:01:42.283000",
          "created": "2024-07-06T06:15:27.994000",
          "tags": [
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "expired",
            "acceptencoding",
            "html info",
            "title home",
            "tags viewport",
            "trackers google",
            "tag manager",
            "gsddf3d2bzf",
            "historical ssl",
            "referrer",
            "december",
            "formbook",
            "round",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "collection",
            "vt graph",
            "socgholish",
            "blister",
            "hacktool",
            "hiddentear",
            "gootloader",
            "agent tesla",
            "crypto",
            "installer",
            "life",
            "malware",
            "open",
            "korplug",
            "tofsee",
            "date",
            "name servers",
            "status",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse submit",
            "url analysis",
            "files",
            "no data",
            "tag count",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "heur",
            "cisco umbrella",
            "alexa top",
            "million",
            "site",
            "alexa",
            "maltiverse",
            "xcnfe",
            "safe site",
            "phishing",
            "remcos",
            "malicious",
            "miner",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "trojan",
            "detplock",
            "artemis",
            "networm",
            "win64",
            "redline stealer",
            "limerat",
            "venom rat",
            "trojanspy",
            "tld count",
            "png image",
            "jpeg image",
            "rgba",
            "exif standard",
            "tiff image",
            "pattern match",
            "ascii text",
            "united",
            "jfif",
            "sha1",
            "core",
            "general",
            "starfield",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "adobea",
            "daga",
            "as30148 sucuri",
            "td tr",
            "search",
            "span td",
            "as44273 host",
            "creation date",
            "a domains",
            "xtra",
            "meta",
            "back",
            "verdict",
            "domain",
            "aaaa",
            "as15169 google",
            "asnone united",
            "nxdomain",
            "sucuri security",
            "a li",
            "span",
            "class",
            "body",
            "sucuri website",
            "a div",
            "authority",
            "record value",
            "showing",
            "gmt content",
            "x sucuri",
            "high",
            "related pulses",
            "show",
            "guard",
            "entries",
            "win32",
            "west domains",
            "next",
            "ipv4",
            "asnone germany",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "formbook cnc",
            "checkin",
            "found",
            "error",
            "code",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "dock",
            "execution",
            "copy",
            "xport",
            "firewall",
            "body doctype",
            "section",
            "dcrat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "url https",
            "blacklist",
            "cl0p ransomware",
            "zbot",
            "malware site",
            "team memscan",
            "cl0p",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus starizona",
            "cngo daddy",
            "g2 validity",
            "subject public",
            "key info",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net192",
            "net1920000",
            "as174",
            "as3257",
            "sucuri",
            "sucur2",
            "verisign",
            "whois database",
            "server",
            "registrar abuse",
            "icann whois",
            "whois status",
            "registrar iana",
            "form",
            "temple",
            "first",
            "android",
            "win32 exe",
            "html",
            "bobby fischer",
            "office open",
            "detections type",
            "name",
            "pdf dealer",
            "price list",
            "pdf my",
            "crime",
            "taiwan unknown",
            "as3462",
            "as131148 bank",
            "as21342",
            "all search",
            "otx scoreblue",
            "pulse pulses",
            "cname",
            "as22612",
            "as43350 nforce",
            "win32upatre jun",
            "expiration date",
            "hostname",
            "lowfi",
            "date hash",
            "avast avg",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jun",
            "files show",
            "registrar",
            "china unknown",
            "title",
            "network",
            "fakedout threat",
            "urls http",
            "maltiverse safe",
            "malicious url",
            "team",
            "phishtank",
            "services",
            "botnet command",
            "control server",
            "mining",
            "betabot",
            "team malware",
            "engineering",
            "stealer",
            "service",
            "vawtrak",
            "virut",
            "emotet",
            "simda",
            "redline",
            "fri oct",
            "media sharing",
            "known infection source",
            "bot networks",
            "malware",
            "malware repository",
            "spyware"
          ],
          "references": [
            "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
            "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
            "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
            "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
            "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
            "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
            "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
            "IP\u2019s Contacted: 192.124.249.187",
            "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
            "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
            "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 89,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 4080,
            "URL": 11952,
            "hostname": 4638,
            "domain": 4301,
            "FileHash-MD5": 2236,
            "FileHash-SHA1": 1140,
            "CVE": 8,
            "SSLCertFingerprint": 20,
            "email": 8,
            "CIDR": 1
          },
          "indicator_count": 28384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "622 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6688e15588a794b95443b46d",
          "name": "Google Spy engine | Tracking, Malware Repository",
          "description": "www.W3.org https://www.searchw3.com/ >  ww.google.com.uy. All tags auto populated. Did not spend time documenting all as pulse is quite large. I was able to prove the the compromises are active. I will make much smaller reports.\n(Botnet Commands, Google Spy engine | Tracking, Malware Repository, Stealer, iPhone unlocker)\nSorry so sloppy and large.\nAll tags , malware families and ATT&CK mechanisms auto populated",
          "modified": "2024-08-05T02:03:31.529000",
          "created": "2024-07-06T06:16:53.461000",
          "tags": [
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "expired",
            "acceptencoding",
            "html info",
            "title home",
            "tags viewport",
            "trackers google",
            "tag manager",
            "gsddf3d2bzf",
            "historical ssl",
            "referrer",
            "december",
            "formbook",
            "round",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "collection",
            "vt graph",
            "socgholish",
            "blister",
            "hacktool",
            "hiddentear",
            "gootloader",
            "agent tesla",
            "crypto",
            "installer",
            "life",
            "malware",
            "open",
            "korplug",
            "tofsee",
            "date",
            "name servers",
            "status",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse submit",
            "url analysis",
            "files",
            "no data",
            "tag count",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "heur",
            "cisco umbrella",
            "alexa top",
            "million",
            "site",
            "alexa",
            "maltiverse",
            "xcnfe",
            "safe site",
            "phishing",
            "remcos",
            "malicious",
            "miner",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "trojan",
            "detplock",
            "artemis",
            "networm",
            "win64",
            "redline stealer",
            "limerat",
            "venom rat",
            "trojanspy",
            "tld count",
            "png image",
            "jpeg image",
            "rgba",
            "exif standard",
            "tiff image",
            "pattern match",
            "ascii text",
            "united",
            "jfif",
            "sha1",
            "core",
            "general",
            "starfield",
            "hybrid",
            "local",
            "encrypt",
            "click",
            "strings",
            "adobea",
            "daga",
            "as30148 sucuri",
            "td tr",
            "search",
            "span td",
            "as44273 host",
            "creation date",
            "a domains",
            "xtra",
            "meta",
            "back",
            "verdict",
            "domain",
            "aaaa",
            "as15169 google",
            "asnone united",
            "nxdomain",
            "sucuri security",
            "a li",
            "span",
            "class",
            "body",
            "sucuri website",
            "a div",
            "authority",
            "record value",
            "showing",
            "gmt content",
            "x sucuri",
            "high",
            "related pulses",
            "show",
            "guard",
            "entries",
            "win32",
            "west domains",
            "next",
            "ipv4",
            "asnone germany",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "formbook cnc",
            "checkin",
            "found",
            "error",
            "code",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "dock",
            "execution",
            "copy",
            "xport",
            "firewall",
            "body doctype",
            "section",
            "dcrat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "url https",
            "blacklist",
            "cl0p ransomware",
            "zbot",
            "malware site",
            "team memscan",
            "cl0p",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus starizona",
            "cngo daddy",
            "g2 validity",
            "subject public",
            "key info",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net192",
            "net1920000",
            "as174",
            "as3257",
            "sucuri",
            "sucur2",
            "verisign",
            "whois database",
            "server",
            "registrar abuse",
            "icann whois",
            "whois status",
            "registrar iana",
            "form",
            "temple",
            "first",
            "android",
            "win32 exe",
            "html",
            "bobby fischer",
            "office open",
            "detections type",
            "name",
            "pdf dealer",
            "price list",
            "pdf my",
            "crime",
            "taiwan unknown",
            "as3462",
            "as131148 bank",
            "as21342",
            "all search",
            "otx scoreblue",
            "pulse pulses",
            "cname",
            "as22612",
            "as43350 nforce",
            "win32upatre jun",
            "expiration date",
            "hostname",
            "lowfi",
            "date hash",
            "avast avg",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jun",
            "files show",
            "registrar",
            "china unknown",
            "title",
            "file size",
            "b file",
            "detections file",
            "gzip chrome",
            "cache entry",
            "graph",
            "ip detections",
            "country",
            "domains",
            "internet domain",
            "service bs",
            "corp",
            "namecheap inc",
            "csc corporate",
            "tucows",
            "epik llc",
            "tucows domains"
          ],
          "references": [
            "https://www.searchw3.com/",
            "IP\u2019s Contacted: 192.124.249.187",
            "Ransomware: message.htm.com",
            "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
            "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
            "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
            "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
            "192.124.249.187",
            "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
            "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 73,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3731,
            "URL": 11926,
            "hostname": 4626,
            "domain": 4135,
            "FileHash-MD5": 1530,
            "FileHash-SHA1": 762,
            "CVE": 8,
            "SSLCertFingerprint": 20,
            "email": 8,
            "CIDR": 1
          },
          "indicator_count": 26747,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "622 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6681f2c0105aaf9e1db540dc",
          "name": "Brian Sabey Orbiting Tsara Brashears and associates | Espionage | Jeffery Scott Reimer Assault ",
          "description": "",
          "modified": "2024-07-29T16:00:46.118000",
          "created": "2024-07-01T00:05:20.043000",
          "tags": [
            "unknown",
            "united",
            "virgin islands",
            "as51852",
            "as33387",
            "as19905",
            "as44273 host",
            "cname",
            "nxdomain",
            "passive dns",
            "url http",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "urls",
            "files ip",
            "address domain",
            "ip related",
            "pulses otx",
            "pulses",
            "related tags",
            "indicator facts",
            "dga domain",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "ip address",
            "related nids",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "b59bn timestamp",
            "ff2c217402202b",
            "code",
            "false",
            "url https",
            "domain",
            "trojan",
            "hostname",
            "files",
            "body",
            "date",
            "path max",
            "age86400 set",
            "cookie",
            "script urls",
            "type",
            "mtb may",
            "script script",
            "trojanspy",
            "striven",
            "miles2",
            "rexxfield",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "date sat",
            "gmt server",
            "sakula malware",
            "historical ssl",
            "realteck audio",
            "lemon duck",
            "iocs",
            "tsara brashears",
            "loki password",
            "stealer",
            "windows",
            "auction",
            "metro",
            "core",
            "colibri loader",
            "hacktool",
            "status",
            "for privacy",
            "creation date",
            "record value",
            "name servers",
            "showing",
            "next",
            "mtb mar",
            "ipv4",
            "ransom",
            "west domains",
            "redacted for",
            "gmt location",
            "gmt max",
            "cowboy",
            "encrypt",
            "as60558 phoenix",
            "susp",
            "win32",
            "methodpost",
            "canada unknown",
            "as43350 nforce",
            "united kingdom",
            "as47846",
            "germany unknown",
            "briansabey",
            "body doubles",
            "orbiters",
            "malvertising",
            "cane",
            "get na",
            "show",
            "as16509",
            "delete c",
            "sinkhole cookie",
            "value snkz",
            "cape",
            "possible",
            "copy",
            "nivdort",
            "write",
            "bayrob",
            "malware",
            "exploit",
            "confirm https",
            "impact",
            "misc http",
            "cvss v2",
            "authentication",
            "n cvss",
            "v3 severity",
            "high attack",
            "emails",
            "cnc",
            "alphacrypt cnc",
            "beacon",
            "as15169 google",
            "limited",
            "as8560",
            "elite",
            "AS33387 nocix llc",
            "pegasus",
            "mercenary",
            "cellerebrand",
            "cellebrite",
            "apple",
            "dark",
            "apple ios",
            "ios",
            "apple iphone",
            "apple itunes",
            "itunes",
            "pegasystem",
            "data brokers",
            "hackers",
            "javascript",
            "please",
            "intel",
            "filehash",
            "av detections",
            "xorddos"
          ],
          "references": [
            "http://www.northpoleroute.com/78985064&type=0&resid=5312625",
            "espysite.azurewebsites.net - https://otx.alienvault.com/indicator/hostname/espysite.azurewebsites.net",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256 aa289c89f2cdbfe896f4c77c611d94aa95858797014b57e24d5fe2bb0997d7b0",
            "Ransom:Win32/Haperlock.A: FileHash-MD5 46480bf46cde2b3e79852661cc5c36fc",
            "Ransom:Win32/Haperlock.A: FileHash-SHA1 c881d1434164b35fb16107a25f84995b7fdef37f",
            "Ransom:Win32/Haperlock.A; FileHash-SHA256 8264c73f129d4895573c2375ea4e4636b9d5df66852ce72ccc20d31a96ae7df1",
            "IDS Detections: W32/Bayrob Attempted Checkin 2 Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin",
            "IDS Detections: Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "Alerts: cape_detected_threat cape_extracted_content",
            "https://otx.alienvault.com/indicator/file/251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "\"Windows SMB Information Disclosure Vulnerability.\" - https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA256 4e692806955f9ee3f4c7a5d9a1ac7729eb53b855b39e6f9f943f89ccba30bd49",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA 453355033bb7977831ca87cc90156b594f13b2ee",
            "Backdoor:Win32/Fynloski.A: FileHash-MD5 c3113684e8f8aa6d1b1b67d59141e845",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA256 7456108771e6a8bac658276c1cb9e18c8c348fdd9cd3538419751c3b5ef3ac02",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA1 7a52b57df5b3c67f810a71dc39ff93688b141534",
            "TrojanClicker:Win32/Ellell.A: 4d3e7d486ec5918d91e54e51c4d07dc6",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA256 105834163b1a0c89e12917a3145e14be6030a611e07f7f62fa7c57de838d6251",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA1 57486d33246bce6dfedb0836cd97c9acd4a4a39a",
            "PWS:Win32/Ymacco.AA50: FileHash-MD5 5739cd62eb88e2a7e514784fe7cf5ca4",
            "https://otx.alienvault.com/indicator/ip/162.222.213.199",
            "TrojanDownloader:Win32/PurityScan.MI!MTB: FileHash-SHA1 58ba8715a88d883537ba8d0e20eea2a4d9269cad",
            "Ransom:Win32/Tescrypt: FileHash-SHA256 916e13eb1e4313b2a04a2ae21b4955b8228183b26709a64284098ca759a8f437",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA256 71fa9257f88c15b438616662dc468327199edb570286c7259d333953006b8eec",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA1 fec703ee7c02ffe35c6b987bb9aac3a765e95dfb",
            "PWS:Win32/QQpass.B!MTB: FileHash-MD5 f7c36b4e5b4b09dc369163377aade2d7",
            "Trojan:Win32/Zombie.A: FileHash-SHA256 0b87667251b79cb800ddd88bdabecea8e13248c426d4a14ae0aae0ef5783f943",
            "Trojan:Win32/Zombie.A: FileHash-SHA1 de974c697f0401d681e1bb3c8694a663e9e43d8f",
            "Trojan:Win32/Zombie.A: FileHash-MD5 34e85820b41c14e07dd564f22997e893",
            "Win.Virus.TeslaCrypt3-2: 78af1fd5be62ab829e49f9a1b5fbb8a9b30f8d0804cba5805c8f350b841d522e",
            "IDS Detections : W32/Bayrob Attempted Checkin 2 CryptoWall Check-in AlphaCrypt CnC Beacon 4 Trojan-Ransom.Win32.Blocker.avsx",
            "IDS Detections : AlphaCrypt CnC Beacon 3 MalDoc Request for Payload Aug 17 2016 Koobface W32/Bayrob Attempted Checkin",
            "IDS Detections : Suspicious Accept in HTTP POST - Possible Alphacrypt/TeslaCrypt Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
            "https://otx.alienvault.com/indicator/ip/185.230.63.186",
            "CnC IP's: 192.187.111.221  63.141.242.43  63.141.242.44  63.141.242.46 81.17.18.195  81.17.18.197 81.17.29.146  81.17.29.148",
            "http://islamicsoftwares.com/downloads/iphone/audioCont/2/107.tar.gz http://islamicsoftwares.com/downloads/iphone/audioCont/7/110.tar.gz",
            "smartphonesonline.co.uk  https://smartphonesonline.co.uk/  https://www.smartphonesonline.co.uk/ [192.187.111.222. US - Request HTTP -Target IP]",
            "Mercenary Attackers / Cellebrite branded as: http://teacellertea.com/Pegasus/ NSO",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/ip/63.141.242.45",
            "Yara Detections: is__elf ,  xorddos ,  LinuxXorDDoS_VariantTwo",
            "Antivirus Detections: ELF:Xorddos-AE\\ [Trj] ,  Unix.Trojan.Xorddos-1 ,",
            "Trojan:Linux/Xorddos: FileHash-MD5 3b4ce1333614cd21c109054630e959b9",
            "Trojan:Linux/Xorddos:  FileHash-SHA1 a5780498e6fce5933a7e7bf59a6fa5742e97f559",
            "Trojan:Linux/Xorddos: FileHash-SHA256 0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "Ransom:Win32/Haperlock.A",
              "display_name": "Ransom:Win32/Haperlock.A",
              "target": "/malware/Ransom:Win32/Haperlock.A"
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "TrojanClicker:Win32/Ellell.A",
              "display_name": "TrojanClicker:Win32/Ellell.A",
              "target": "/malware/TrojanClicker:Win32/Ellell.A"
            },
            {
              "id": "Bayrob",
              "display_name": "Bayrob",
              "target": null
            },
            {
              "id": "Win.Virus.TeslaCrypt3-2/Custom",
              "display_name": "Win.Virus.TeslaCrypt3-2/Custom",
              "target": null
            },
            {
              "id": "PWS:Win32/Ymacco.AA50",
              "display_name": "PWS:Win32/Ymacco.AA50",
              "target": "/malware/PWS:Win32/Ymacco.AA50"
            },
            {
              "id": "Ransom:Win32/Tescrypt",
              "display_name": "Ransom:Win32/Tescrypt",
              "target": "/malware/Ransom:Win32/Tescrypt"
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Pegasus for Android - MOB-S0032",
              "display_name": "Pegasus for Android - MOB-S0032",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Trojan:Linux/Xorddos",
              "display_name": "Trojan:Linux/Xorddos",
              "target": "/malware/Trojan:Linux/Xorddos"
            },
            {
              "id": "Sakula RAT",
              "display_name": "Sakula RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66804428b487338dc16f70a7",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2091,
            "hostname": 547,
            "URL": 1254,
            "FileHash-MD5": 425,
            "FileHash-SHA256": 2161,
            "SSLCertFingerprint": 2,
            "FileHash-SHA1": 426,
            "CVE": 2,
            "email": 8
          },
          "indicator_count": 6916,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "629 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6680447d3a533233ed48b5e5",
          "name": "Trojan:Linux/Xorddos | Trojan:Win32/Zombie.A | TrojanClicker:Win32/Ellell.A ",
          "description": "",
          "modified": "2024-07-29T16:00:46.118000",
          "created": "2024-06-29T17:29:33.778000",
          "tags": [
            "unknown",
            "united",
            "virgin islands",
            "as51852",
            "as33387",
            "as19905",
            "as44273 host",
            "cname",
            "nxdomain",
            "passive dns",
            "url http",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "urls",
            "files ip",
            "address domain",
            "ip related",
            "pulses otx",
            "pulses",
            "related tags",
            "indicator facts",
            "dga domain",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "ip address",
            "related nids",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "b59bn timestamp",
            "ff2c217402202b",
            "code",
            "false",
            "url https",
            "domain",
            "trojan",
            "hostname",
            "files",
            "body",
            "date",
            "path max",
            "age86400 set",
            "cookie",
            "script urls",
            "type",
            "mtb may",
            "script script",
            "trojanspy",
            "striven",
            "miles2",
            "rexxfield",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "date sat",
            "gmt server",
            "sakula malware",
            "historical ssl",
            "realteck audio",
            "lemon duck",
            "iocs",
            "tsara brashears",
            "loki password",
            "stealer",
            "windows",
            "auction",
            "metro",
            "core",
            "colibri loader",
            "hacktool",
            "status",
            "for privacy",
            "creation date",
            "record value",
            "name servers",
            "showing",
            "next",
            "mtb mar",
            "ipv4",
            "ransom",
            "west domains",
            "redacted for",
            "gmt location",
            "gmt max",
            "cowboy",
            "encrypt",
            "as60558 phoenix",
            "susp",
            "win32",
            "methodpost",
            "canada unknown",
            "as43350 nforce",
            "united kingdom",
            "as47846",
            "germany unknown",
            "briansabey",
            "body doubles",
            "orbiters",
            "malvertising",
            "cane",
            "get na",
            "show",
            "as16509",
            "delete c",
            "sinkhole cookie",
            "value snkz",
            "cape",
            "possible",
            "copy",
            "nivdort",
            "write",
            "bayrob",
            "malware",
            "exploit",
            "confirm https",
            "impact",
            "misc http",
            "cvss v2",
            "authentication",
            "n cvss",
            "v3 severity",
            "high attack",
            "emails",
            "cnc",
            "alphacrypt cnc",
            "beacon",
            "as15169 google",
            "limited",
            "as8560",
            "elite",
            "AS33387 nocix llc",
            "pegasus",
            "mercenary",
            "cellerebrand",
            "cellebrite",
            "apple",
            "dark",
            "apple ios",
            "ios",
            "apple iphone",
            "apple itunes",
            "itunes",
            "pegasystem",
            "data brokers",
            "hackers",
            "javascript",
            "please",
            "intel",
            "filehash",
            "av detections",
            "xorddos"
          ],
          "references": [
            "http://www.northpoleroute.com/78985064&type=0&resid=5312625",
            "espysite.azurewebsites.net - https://otx.alienvault.com/indicator/hostname/espysite.azurewebsites.net",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256 aa289c89f2cdbfe896f4c77c611d94aa95858797014b57e24d5fe2bb0997d7b0",
            "Ransom:Win32/Haperlock.A: FileHash-MD5 46480bf46cde2b3e79852661cc5c36fc",
            "Ransom:Win32/Haperlock.A: FileHash-SHA1 c881d1434164b35fb16107a25f84995b7fdef37f",
            "Ransom:Win32/Haperlock.A; FileHash-SHA256 8264c73f129d4895573c2375ea4e4636b9d5df66852ce72ccc20d31a96ae7df1",
            "IDS Detections: W32/Bayrob Attempted Checkin 2 Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin",
            "IDS Detections: Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "Alerts: cape_detected_threat cape_extracted_content",
            "https://otx.alienvault.com/indicator/file/251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "\"Windows SMB Information Disclosure Vulnerability.\" - https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA256 4e692806955f9ee3f4c7a5d9a1ac7729eb53b855b39e6f9f943f89ccba30bd49",
            "Backdoor:Win32/Fynloski.A: FileHash-SHA 453355033bb7977831ca87cc90156b594f13b2ee",
            "Backdoor:Win32/Fynloski.A: FileHash-MD5 c3113684e8f8aa6d1b1b67d59141e845",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA256 7456108771e6a8bac658276c1cb9e18c8c348fdd9cd3538419751c3b5ef3ac02",
            "TrojanClicker:Win32/Ellell.A: FileHash-SHA1 7a52b57df5b3c67f810a71dc39ff93688b141534",
            "TrojanClicker:Win32/Ellell.A: 4d3e7d486ec5918d91e54e51c4d07dc6",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA256 105834163b1a0c89e12917a3145e14be6030a611e07f7f62fa7c57de838d6251",
            "PWS:Win32/Ymacco.AA50: FileHash-SHA1 57486d33246bce6dfedb0836cd97c9acd4a4a39a",
            "PWS:Win32/Ymacco.AA50: FileHash-MD5 5739cd62eb88e2a7e514784fe7cf5ca4",
            "https://otx.alienvault.com/indicator/ip/162.222.213.199",
            "TrojanDownloader:Win32/PurityScan.MI!MTB: FileHash-SHA1 58ba8715a88d883537ba8d0e20eea2a4d9269cad",
            "Ransom:Win32/Tescrypt: FileHash-SHA256 916e13eb1e4313b2a04a2ae21b4955b8228183b26709a64284098ca759a8f437",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA256 71fa9257f88c15b438616662dc468327199edb570286c7259d333953006b8eec",
            "PWS:Win32/QQpass.B!MTB: FileHash-SHA1 fec703ee7c02ffe35c6b987bb9aac3a765e95dfb",
            "PWS:Win32/QQpass.B!MTB: FileHash-MD5 f7c36b4e5b4b09dc369163377aade2d7",
            "Trojan:Win32/Zombie.A: FileHash-SHA256 0b87667251b79cb800ddd88bdabecea8e13248c426d4a14ae0aae0ef5783f943",
            "Trojan:Win32/Zombie.A: FileHash-SHA1 de974c697f0401d681e1bb3c8694a663e9e43d8f",
            "Trojan:Win32/Zombie.A: FileHash-MD5 34e85820b41c14e07dd564f22997e893",
            "Win.Virus.TeslaCrypt3-2: 78af1fd5be62ab829e49f9a1b5fbb8a9b30f8d0804cba5805c8f350b841d522e",
            "IDS Detections : W32/Bayrob Attempted Checkin 2 CryptoWall Check-in AlphaCrypt CnC Beacon 4 Trojan-Ransom.Win32.Blocker.avsx",
            "IDS Detections : AlphaCrypt CnC Beacon 3 MalDoc Request for Payload Aug 17 2016 Koobface W32/Bayrob Attempted Checkin",
            "IDS Detections : Suspicious Accept in HTTP POST - Possible Alphacrypt/TeslaCrypt Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
            "https://otx.alienvault.com/indicator/ip/185.230.63.186",
            "CnC IP's: 192.187.111.221  63.141.242.43  63.141.242.44  63.141.242.46 81.17.18.195  81.17.18.197 81.17.29.146  81.17.29.148",
            "http://islamicsoftwares.com/downloads/iphone/audioCont/2/107.tar.gz http://islamicsoftwares.com/downloads/iphone/audioCont/7/110.tar.gz",
            "smartphonesonline.co.uk  https://smartphonesonline.co.uk/  https://www.smartphonesonline.co.uk/ [192.187.111.222. US - Request HTTP -Target IP]",
            "Mercenary Attackers / Cellebrite branded as: http://teacellertea.com/Pegasus/ NSO",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://otx.alienvault.com/indicator/ip/63.141.242.45",
            "Yara Detections: is__elf ,  xorddos ,  LinuxXorDDoS_VariantTwo",
            "Antivirus Detections: ELF:Xorddos-AE\\ [Trj] ,  Unix.Trojan.Xorddos-1 ,",
            "Trojan:Linux/Xorddos: FileHash-MD5 3b4ce1333614cd21c109054630e959b9",
            "Trojan:Linux/Xorddos:  FileHash-SHA1 a5780498e6fce5933a7e7bf59a6fa5742e97f559",
            "Trojan:Linux/Xorddos: FileHash-SHA256 0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
            "https://hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "Ransom:Win32/Haperlock.A",
              "display_name": "Ransom:Win32/Haperlock.A",
              "target": "/malware/Ransom:Win32/Haperlock.A"
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "TrojanClicker:Win32/Ellell.A",
              "display_name": "TrojanClicker:Win32/Ellell.A",
              "target": "/malware/TrojanClicker:Win32/Ellell.A"
            },
            {
              "id": "Bayrob",
              "display_name": "Bayrob",
              "target": null
            },
            {
              "id": "Win.Virus.TeslaCrypt3-2/Custom",
              "display_name": "Win.Virus.TeslaCrypt3-2/Custom",
              "target": null
            },
            {
              "id": "PWS:Win32/Ymacco.AA50",
              "display_name": "PWS:Win32/Ymacco.AA50",
              "target": "/malware/PWS:Win32/Ymacco.AA50"
            },
            {
              "id": "Ransom:Win32/Tescrypt",
              "display_name": "Ransom:Win32/Tescrypt",
              "target": "/malware/Ransom:Win32/Tescrypt"
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Pegasus for Android - MOB-S0032",
              "display_name": "Pegasus for Android - MOB-S0032",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Trojan:Linux/Xorddos",
              "display_name": "Trojan:Linux/Xorddos",
              "target": "/malware/Trojan:Linux/Xorddos"
            },
            {
              "id": "Sakula RAT",
              "display_name": "Sakula RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66804428b487338dc16f70a7",
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2091,
            "hostname": 547,
            "URL": 1254,
            "FileHash-MD5": 425,
            "FileHash-SHA256": 2161,
            "SSLCertFingerprint": 2,
            "FileHash-SHA1": 426,
            "CVE": 2,
            "email": 8
          },
          "indicator_count": 6916,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "629 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66513cd20b844880271acd1b",
          "name": "v.g.t.",
          "description": "",
          "modified": "2024-05-25T01:20:18.043000",
          "created": "2024-05-25T01:20:18.043000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 41
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 177,
          "modified_text": "694 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f980ad16123b5d52f5f76f",
          "name": "DNS Hijacking - \u4e5d\u79c0\u76f4\u64ad-\u9ad8\u54c1\u8d28\u7f8e\u5973\u5728\u7ebf\u89c6\u9891\u4e92\u52a8\u793e\u533a -MilesIT.com [Report originated from octoseek]",
          "description": "",
          "modified": "2024-04-13T11:00:32.548000",
          "created": "2024-03-19T12:10:21.291000",
          "tags": [
            "q htpps",
            "g htpps",
            "q https",
            "virustotal",
            "exif standard",
            "tiff image",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "default",
            "jpeg image",
            "search",
            "copy",
            "code",
            "write",
            "pecompact",
            "february",
            "packer",
            "delphi",
            "win32",
            "persistence",
            "execution",
            "next",
            "create c",
            "delete c",
            "intel",
            "ms windows",
            "pe32",
            "precreate read",
            "united",
            "show",
            "regsetvalueexa",
            "trojan",
            "markus",
            "mozilla",
            "write c",
            "json",
            "entries",
            "ascii text",
            "data",
            "as15169",
            "error",
            "malware",
            "win64",
            "denmark as32934",
            "ip hostname",
            "reverse ip",
            "lookup country",
            "as7018 att",
            "as14618",
            "as54113",
            "country code",
            "as36081 state",
            "redirect chain",
            "redirection",
            "location",
            "lakewood",
            "emails",
            "as name",
            "ssl certificate",
            "whois record",
            "k0pmbc",
            "spsfsb",
            "zwdk9d",
            "vwdzfe",
            "contacted",
            "referrer",
            "ntmzac",
            "historical ssl",
            "august",
            "hacktool",
            "core",
            "agent tesla",
            "emotet",
            "chaos",
            "ransomexx",
            "quasar",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnamazon",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "first",
            "server",
            "registrar abuse",
            "date",
            "markmonitor",
            "epic games",
            "iana id",
            "contact phone",
            "domain status",
            "registrar whois",
            "registrar",
            "win32 exe",
            "python",
            "launchres",
            "win32 dll",
            "unrealengine",
            "detections type",
            "name",
            "bundled",
            "ctsu",
            "smokeloader",
            "privateloader",
            "relic",
            "monitoring",
            "startpage",
            "\u7f8e\u5973\u76f4\u64ad",
            "\u7f8e\u5973\u89c6\u9891",
            "\u7f8e\u5973\u4e3b\u64ad",
            "\u89c6\u9891\u804a\u5929",
            "\u89c6\u9891\u4ea4\u53cb",
            "\u7f8e\u5973\u4ea4\u53cb",
            "\u7f8e\u5973\u79c0\u573a",
            "\u6e05\u7eaf\u7f8e\u5973",
            "\u6027\u611f\u7f8e\u5973",
            "\u7f8e\u5973\u4e92\u52a8",
            "\u7f8e\u5973\u804a\u5929",
            "\u7f8e\u5973\u5728\u7ebf\u8868\u6f14",
            "\u7f8e\u5973\u76f4\u64ad\u95f4",
            "\u7f8e\u5973\u804a\u5929\u5ba4",
            "icp2021030667",
            "0110542",
            "copyright",
            "rights reserved",
            "resolutions",
            "contacted urls",
            "siblings domain",
            "siblings",
            "parent domain",
            "cname",
            "whitelisted",
            "status",
            "as15169 google",
            "asnone united",
            "servers",
            "aaaa",
            "body",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "site top",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "million alexa",
            "site safe",
            "malicious site",
            "unsafe",
            "alexa",
            "riskware",
            "artemis",
            "blacknet rat",
            "quasar rat",
            "crack",
            "presenoker",
            "dapato",
            "stealer",
            "phish",
            "memscan",
            "nsis",
            "phishing",
            "bulz",
            "maltiverse",
            "trojanspy",
            "blacknet",
            "zbot",
            "aig",
            "unknown",
            "passive dns",
            "urls",
            "expiresthu",
            "gmt path",
            "scan endpoints",
            "encrypt",
            "dynamicloader",
            "high",
            "medium",
            "qaeaav12",
            "windows",
            "cape",
            "windows wget",
            "suspicious",
            "powershell",
            "canvas",
            "form",
            "showing",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "cus cnr3",
            "olet",
            "l http",
            "wifi",
            "wifi access",
            "wifi hotspot",
            "wifi internet",
            "southwest wifi",
            "inflight",
            "inflight entertainment",
            "southwest",
            "comedy",
            "internet",
            "strong",
            "drama",
            "google chrome",
            "business select",
            "internet access",
            "apple safari",
            "book",
            "rapid",
            "love",
            "summer",
            "poppy",
            "floyd",
            "district",
            "jackson",
            "kevin",
            "live",
            "music",
            "upgrade",
            "gift",
            "lost",
            "carol",
            "canada",
            "cobalt strike",
            "malicious",
            "fragtor",
            "phishing paypal",
            "mail spammer"
          ],
          "references": [
            "https://www.9xiuzb.com/activity/activity_pcunion?piusr=t_420",
            "tracking.epicgames.com | epicgames.com | https://www.epicgames.com/id/activate",
            "Conneted to Network: drcody@milesit.com | milesit.com | milestechnologies.com | info.milestechnologies.com | www.milesit.com | www.milestechnologies.com",
            "Conneted to Network: http://seed.wavebrowser.co/seed?osname=win&channel=stable&milestone=1 | f16ac036e3.nxcli.net",
            "Conneted to Network: https://getconnected.southwestwifi.com | www.coloradoltcpartnership.org",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
            "https://otx.alienvault.com/indicator/file/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/f0d38614f706da3a08acdf7188eac139a352621ccada40e5e22d191412acc357",
            "Phone purchased for target by a 'self-proclaimed' W/F PI from Lakewood, Colorado w/o consent/prior knowledge. PI fitful, so target paid for phone.",
            "Found claims PI was a hacker. Brother a hitman. Verbalized non-specific affiliation w/City of Lakewood. Refused to provide target phone passcode.",
            "Target admits to ignoring major signs: 'PI' called just before request submitted.Spent hours researching & denouncing targets former 'questionable 'PI",
            "'PI' feigned high concern for target, begged her to meet at 10 P.M. Target refused. Target states she will only meet in safe public spot in daylight.",
            "'PI' arrives in separate car w/unseen veteran. Points out DV LP to target , states he's not with her. Leads target to restaurant 'to talk'. Stays awhile.",
            "'PI' orders 2 meals. Leaves restaurant a few times. Talks about troubled mother  w/medication addictions. Incredibly emotional vowing to be better.",
            "Emotionally demands disabled target cash advanced to pay all bills. Denies formerly alleged abilities & skills, still wants $1500 for 4 hours of nothing.",
            "Of note: Alleging Federal Investigator calls target. Found her in Bark? No. He asks for $4G to relocate target in 2 days provide hacker secured iPhone.",
            "'PI' claims to have information. Sends  picture of who he claims is attacker now millionaire owner of Mile High Sports & Rehabilitation. Asks if she knew.",
            "Target knows nothing about assaulter. Chicago Fed  text photo for target to confirm identity of attacker. Be sends a photo of Dr. John T. Sasha.",
            "Target was treated by Dr. Sasha, was not assaulter. Target relays Law Firm dropped her as she refused to include Sasha in Injury claim.",
            "Goal to present targets case, blame & have Sacha removed by board of Colorado attorneys. Widely known firm angrily begins misconduct in her case.",
            "Fed alleged if Sasha was in cahoots she could get millions. Target again refused. Alleging Chicago Fed contends be needs  to move her 50+ miles.",
            "Fed lost interest after satisfied Sasha wasn't of interest. Target interest to rid self of hackers and stalkers. Inundated with  calls from fake PI's.",
            "Colorado doesn't require a PI licensure. That's a major problem as many stalkers, malicious hackers & the ruthless are drawn to this occupation.",
            "Metro T-Mobile refuses refund. Allows target to store phone with them in resealed box. When retrieved box opened and tampered with.",
            "Issues: Target contacted a single PI from a very compromised device, received sealed as gift from trusted person via provider. Others contact her.",
            "I know this isn't a blog. If someone is targeted, every device will be compromised. It's the goal of the attackers. Unwarranted bounty found.",
            "Law enforcement aware and assure target in person she's not a suspect in any crime is Colorado or nationally. All DA's, law enforcement PI's check.",
            "You can either have a runner or become a hacker. Only  2 choices for targeted individuals. Target needs to become ethical hacker or ethical grey hat, Purple teamer.",
            "Device security reset temporarily before epicgames[.]com a resource being used attempted to self download.  Relentless...",
            "Self whitelisting tool, domains moved within nginx."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Bulz",
              "display_name": "Bulz",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Fragtor",
              "display_name": "Fragtor",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65f4ba867ec44a4dc0e6fc96",
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8753,
            "domain": 1525,
            "hostname": 3740,
            "FileHash-SHA256": 6746,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 509,
            "SSLCertFingerprint": 3,
            "CVE": 8,
            "CIDR": 5,
            "email": 7
          },
          "indicator_count": 21915,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 235,
          "modified_text": "736 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f4ba867ec44a4dc0e6fc96",
          "name": "DNS Hijacking - \u4e5d\u79c0\u76f4\u64ad-\u9ad8\u54c1\u8d28\u7f8e\u5973\u5728\u7ebf\u89c6\u9891\u4e92\u52a8\u793e\u533a -MilesIT.com",
          "description": "Jiuxiu Live - High-quality beauty online video interactive community - \u4e5d\u79c0\u76f4\u64ad-\u9ad8\u54c1\u8d28\u7f8e\u5973\u5728\u7ebf\u89c6\u9891\u4e92\u52a8\u793e\u533a -porn dump. Performed tiny DNS test on affected target. \nDNS stuffing  pornography. DNSpionage , custom browser, DNS tunneling encoding  data, programs, protocols, DNS queries, responses, amplification attack; perform  (DDoS) on server, flood attack,  spoofing.  Attack. Miles IT & affiliated logging inas target. Pitfall of being compromised for some; you won't speak to legitimate business unless you know & recognize voice. \nSome notations in references.",
          "modified": "2024-04-13T11:00:32.548000",
          "created": "2024-03-15T21:15:50.802000",
          "tags": [
            "q htpps",
            "g htpps",
            "q https",
            "virustotal",
            "exif standard",
            "tiff image",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "default",
            "jpeg image",
            "search",
            "copy",
            "code",
            "write",
            "pecompact",
            "february",
            "packer",
            "delphi",
            "win32",
            "persistence",
            "execution",
            "next",
            "create c",
            "delete c",
            "intel",
            "ms windows",
            "pe32",
            "precreate read",
            "united",
            "show",
            "regsetvalueexa",
            "trojan",
            "markus",
            "mozilla",
            "write c",
            "json",
            "entries",
            "ascii text",
            "data",
            "as15169",
            "error",
            "malware",
            "win64",
            "denmark as32934",
            "ip hostname",
            "reverse ip",
            "lookup country",
            "as7018 att",
            "as14618",
            "as54113",
            "country code",
            "as36081 state",
            "redirect chain",
            "redirection",
            "location",
            "lakewood",
            "emails",
            "as name",
            "ssl certificate",
            "whois record",
            "k0pmbc",
            "spsfsb",
            "zwdk9d",
            "vwdzfe",
            "contacted",
            "referrer",
            "ntmzac",
            "historical ssl",
            "august",
            "hacktool",
            "core",
            "agent tesla",
            "emotet",
            "chaos",
            "ransomexx",
            "quasar",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnamazon",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "first",
            "server",
            "registrar abuse",
            "date",
            "markmonitor",
            "epic games",
            "iana id",
            "contact phone",
            "domain status",
            "registrar whois",
            "registrar",
            "win32 exe",
            "python",
            "launchres",
            "win32 dll",
            "unrealengine",
            "detections type",
            "name",
            "bundled",
            "ctsu",
            "smokeloader",
            "privateloader",
            "relic",
            "monitoring",
            "startpage",
            "\u7f8e\u5973\u76f4\u64ad",
            "\u7f8e\u5973\u89c6\u9891",
            "\u7f8e\u5973\u4e3b\u64ad",
            "\u89c6\u9891\u804a\u5929",
            "\u89c6\u9891\u4ea4\u53cb",
            "\u7f8e\u5973\u4ea4\u53cb",
            "\u7f8e\u5973\u79c0\u573a",
            "\u6e05\u7eaf\u7f8e\u5973",
            "\u6027\u611f\u7f8e\u5973",
            "\u7f8e\u5973\u4e92\u52a8",
            "\u7f8e\u5973\u804a\u5929",
            "\u7f8e\u5973\u5728\u7ebf\u8868\u6f14",
            "\u7f8e\u5973\u76f4\u64ad\u95f4",
            "\u7f8e\u5973\u804a\u5929\u5ba4",
            "icp2021030667",
            "0110542",
            "copyright",
            "rights reserved",
            "resolutions",
            "contacted urls",
            "siblings domain",
            "siblings",
            "parent domain",
            "cname",
            "whitelisted",
            "status",
            "as15169 google",
            "asnone united",
            "servers",
            "aaaa",
            "body",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "site top",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "million alexa",
            "site safe",
            "malicious site",
            "unsafe",
            "alexa",
            "riskware",
            "artemis",
            "blacknet rat",
            "quasar rat",
            "crack",
            "presenoker",
            "dapato",
            "stealer",
            "phish",
            "memscan",
            "nsis",
            "phishing",
            "bulz",
            "maltiverse",
            "trojanspy",
            "blacknet",
            "zbot",
            "aig",
            "unknown",
            "passive dns",
            "urls",
            "expiresthu",
            "gmt path",
            "scan endpoints",
            "encrypt",
            "dynamicloader",
            "high",
            "medium",
            "qaeaav12",
            "windows",
            "cape",
            "windows wget",
            "suspicious",
            "powershell",
            "canvas",
            "form",
            "showing",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "cus cnr3",
            "olet",
            "l http",
            "wifi",
            "wifi access",
            "wifi hotspot",
            "wifi internet",
            "southwest wifi",
            "inflight",
            "inflight entertainment",
            "southwest",
            "comedy",
            "internet",
            "strong",
            "drama",
            "google chrome",
            "business select",
            "internet access",
            "apple safari",
            "book",
            "rapid",
            "love",
            "summer",
            "poppy",
            "floyd",
            "district",
            "jackson",
            "kevin",
            "live",
            "music",
            "upgrade",
            "gift",
            "lost",
            "carol",
            "canada",
            "cobalt strike",
            "malicious",
            "fragtor",
            "phishing paypal",
            "mail spammer"
          ],
          "references": [
            "https://www.9xiuzb.com/activity/activity_pcunion?piusr=t_420",
            "tracking.epicgames.com | epicgames.com | https://www.epicgames.com/id/activate",
            "Conneted to Network: drcody@milesit.com | milesit.com | milestechnologies.com | info.milestechnologies.com | www.milesit.com | www.milestechnologies.com",
            "Conneted to Network: http://seed.wavebrowser.co/seed?osname=win&channel=stable&milestone=1 | f16ac036e3.nxcli.net",
            "Conneted to Network: https://getconnected.southwestwifi.com | www.coloradoltcpartnership.org",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
            "https://otx.alienvault.com/indicator/file/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/f0d38614f706da3a08acdf7188eac139a352621ccada40e5e22d191412acc357",
            "Phone purchased for target by a 'self-proclaimed' W/F PI from Lakewood, Colorado w/o consent/prior knowledge. PI fitful, so target paid for phone.",
            "Found claims PI was a hacker. Brother a hitman. Verbalized non-specific affiliation w/City of Lakewood. Refused to provide target phone passcode.",
            "Target admits to ignoring major signs: 'PI' called just before request submitted.Spent hours researching & denouncing targets former 'questionable 'PI",
            "'PI' feigned high concern for target, begged her to meet at 10 P.M. Target refused. Target states she will only meet in safe public spot in daylight.",
            "'PI' arrives in separate car w/unseen veteran. Points out DV LP to target , states he's not with her. Leads target to restaurant 'to talk'. Stays awhile.",
            "'PI' orders 2 meals. Leaves restaurant a few times. Talks about troubled mother  w/medication addictions. Incredibly emotional vowing to be better.",
            "Emotionally demands disabled target cash advanced to pay all bills. Denies formerly alleged abilities & skills, still wants $1500 for 4 hours of nothing.",
            "Of note: Alleging Federal Investigator calls target. Found her in Bark? No. He asks for $4G to relocate target in 2 days provide hacker secured iPhone.",
            "'PI' claims to have information. Sends  picture of who he claims is attacker now millionaire owner of Mile High Sports & Rehabilitation. Asks if she knew.",
            "Target knows nothing about assaulter. Chicago Fed  text photo for target to confirm identity of attacker. Be sends a photo of Dr. John T. Sasha.",
            "Target was treated by Dr. Sasha, was not assaulter. Target relays Law Firm dropped her as she refused to include Sasha in Injury claim.",
            "Goal to present targets case, blame & have Sacha removed by board of Colorado attorneys. Widely known firm angrily begins misconduct in her case.",
            "Fed alleged if Sasha was in cahoots she could get millions. Target again refused. Alleging Chicago Fed contends be needs  to move her 50+ miles.",
            "Fed lost interest after satisfied Sasha wasn't of interest. Target interest to rid self of hackers and stalkers. Inundated with  calls from fake PI's.",
            "Colorado doesn't require a PI licensure. That's a major problem as many stalkers, malicious hackers & the ruthless are drawn to this occupation.",
            "Metro T-Mobile refuses refund. Allows target to store phone with them in resealed box. When retrieved box opened and tampered with.",
            "Issues: Target contacted a single PI from a very compromised device, received sealed as gift from trusted person via provider. Others contact her.",
            "I know this isn't a blog. If someone is targeted, every device will be compromised. It's the goal of the attackers. Unwarranted bounty found.",
            "Law enforcement aware and assure target in person she's not a suspect in any crime is Colorado or nationally. All DA's, law enforcement PI's check.",
            "You can either have a runner or become a hacker. Only  2 choices for targeted individuals. Target needs to become ethical hacker or ethical grey hat, Purple teamer.",
            "Device security reset temporarily before epicgames[.]com a resource being used attempted to self download.  Relentless...",
            "Self whitelisting tool, domains moved within nginx."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Bulz",
              "display_name": "Bulz",
              "target": null
            },
            {
              "id": "Quasar",
              "display_name": "Quasar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Fragtor",
              "display_name": "Fragtor",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8753,
            "domain": 1525,
            "hostname": 3740,
            "FileHash-SHA256": 6746,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 509,
            "SSLCertFingerprint": 3,
            "CVE": 8,
            "CIDR": 5,
            "email": 7
          },
          "indicator_count": 21915,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "736 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a20ff8db3854e863dca324",
          "name": "Shared Modules | Hijacker | Masquerading",
          "description": "",
          "modified": "2024-02-12T04:01:56.040000",
          "created": "2024-01-13T04:22:16.961000",
          "tags": [
            "filehashmd5",
            "no expiration",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "hostname",
            "expiration",
            "domain",
            "url https",
            "url http",
            "source",
            "stix",
            "email",
            "email abuse",
            "goreasonlimited",
            "cc no",
            "tompc",
            "sum35",
            "domain xn",
            "searchbox0",
            "domainname0",
            "view",
            "apple",
            "apple id",
            "hijacking",
            "masquerading",
            "exploit",
            "cams",
            "monitoring",
            "loki bot",
            "dns",
            "open ports",
            "malvertizing",
            "malware hosting",
            "apple script",
            "js user",
            "dga",
            "dga domains",
            "malware",
            "multiple_versions",
            "wagersta",
            "decode",
            "system information discovery",
            "decrypt",
            "evasion",
            "defense evasion",
            "emotet",
            "android",
            "ios",
            "wannacry",
            "trojan",
            "worm",
            "cyber threat",
            "benjamin",
            "whois record",
            "ssl certificate",
            "contacted",
            "historical ssl",
            "referrer",
            "contacted urls",
            "execution",
            "whois whois",
            "whois sslcert",
            "and china",
            "drop",
            "uchealth",
            "university of cincinnati health"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 2296,
            "FileHash-SHA256": 3362,
            "URL": 6191,
            "domain": 2033,
            "hostname": 3097,
            "email": 37,
            "CVE": 2
          },
          "indicator_count": 19719,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62c094011f377ca9945fcad8",
          "name": "www.vasculartreatment.co.uk associate domains is a list of 37 owned by a bad actor running a number of \"as a service\"  that has unauth",
          "description": "access to have ability to change records and remove domain history. The oldest set of domain ie the 37 i have tracked for over two years\nthrillville.com\t1\ninnovatingforcovid.africa\t1\nlipcrack.com\t1\neasy-top-up.com\t1\nprayerandfasting.com\t1\ntgae.com\t1\npeoplewho.africa\t1\nlutronfabrics.com\t1\nfuckthe.com\t1\nperformanceshadingadvisor.com\t1\nlawanna.com\t1\ndesktoplogic.com\t1\nmysaviour.com\t1\ndigitalpromise.com\t1\nquickpromotions.com\t1\nartistryonline.com\t1\nnewconsultant.com\t1\nhzrp.com\t1\nelisaauger.com\t1\npcgamer7.com\t1\nacutcmdetox.com\t1\nhzfq.com\t1\nadvertisingace.com\t1\nserenapro.com\t1\nkeith-clay-floors.com\t1\nlutronatlowes.com\t1\nsupermileage.com\t1\nhtbwmedia.com\t1\nquicktutorial.com\t1\ncasetawireless.com\t1\nbeforemarriage.com\t1\nsuperconferencelive.com\t.\nblacksea-cbc.net\t.\ntoolsofenslavement.com\t.\nultimatesecrettosuccess.com\t.\ntextarealinvestor.com\t.\nratioeffect.com\t.\nnmmatyc.org\t.\nstthomasmillionairemastermind.com\t.\njicleaningservices.com\t.\naddis97.com\t.",
          "modified": "2022-08-01T00:01:42.977000",
          "created": "2022-07-02T18:52:49.664000",
          "tags": [
            "hostmaster"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 26,
            "URL": 88,
            "domain": 72,
            "FileHash-SHA256": 1
          },
          "indicator_count": 187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1357 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "Law enforcement aware and assure target in person she's not a suspect in any crime is Colorado or nationally. All DA's, law enforcement PI's check.",
        "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
        "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
        "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
        "nr-data.net [Apple Private Data Collection]",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "https://hallrender.com/attorney/brian-sabey",
        "https://api.strem.io/api/addonCollectionGet%",
        "'PI' claims to have information. Sends  picture of who he claims is attacker now millionaire owner of Mile High Sports & Rehabilitation. Asks if she knew.",
        "Backdoor:Win32/Fynloski.A: FileHash-MD5 c3113684e8f8aa6d1b1b67d59141e845",
        "Trojan:Linux/Xorddos: FileHash-SHA256 0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
        "Conneted to Network: https://getconnected.southwestwifi.com | www.coloradoltcpartnership.org",
        "Issues: Target contacted a single PI from a very compromised device, received sealed as gift from trusted person via provider. Others contact her.",
        "record-viewer-application.hcahealthcare.cloud",
        "TrojanClicker:Win32/Ellell.A: 4d3e7d486ec5918d91e54e51c4d07dc6",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/f0d38614f706da3a08acdf7188eac139a352621ccada40e5e22d191412acc357",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Trojan:Linux/Xorddos:  FileHash-SHA1 a5780498e6fce5933a7e7bf59a6fa5742e97f559",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
        "'PI' feigned high concern for target, begged her to meet at 10 P.M. Target refused. Target states she will only meet in safe public spot in daylight.",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "consolefoundry.date \u2022 http://consolefoundry.date",
        "afraid.org | evergreen.afraid.org",
        "IP\u2019s Contacted: 192.124.249.187",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "PWS:Win32/Ymacco.AA50: FileHash-MD5 5739cd62eb88e2a7e514784fe7cf5ca4",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "IDS Detections: W32/Bayrob Attempted Checkin 2 Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin",
        "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
        "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "Target was treated by Dr. Sasha, was not assaulter. Target relays Law Firm dropped her as she refused to include Sasha in Injury claim.",
        "TrojanDownloader:Win32/PurityScan.MI!MTB: FileHash-SHA1 58ba8715a88d883537ba8d0e20eea2a4d9269cad",
        "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
        "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "Device security reset temporarily before epicgames[.]com a resource being used attempted to self download.  Relentless...",
        "Ransom:Win32/Haperlock.A: FileHash-SHA1 c881d1434164b35fb16107a25f84995b7fdef37f",
        "Conneted to Network: drcody@milesit.com | milesit.com | milestechnologies.com | info.milestechnologies.com | www.milesit.com | www.milestechnologies.com",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
        "Fed alleged if Sasha was in cahoots she could get millions. Target again refused. Alleging Chicago Fed contends be needs  to move her 50+ miles.",
        "\"Windows SMB Information Disclosure Vulnerability.\" - https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256 aa289c89f2cdbfe896f4c77c611d94aa95858797014b57e24d5fe2bb0997d7b0",
        "Conneted to Network: http://seed.wavebrowser.co/seed?osname=win&channel=stable&milestone=1 | f16ac036e3.nxcli.net",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "Yara Detections: is__elf ,  xorddos ,  LinuxXorDDoS_VariantTwo",
        "aohhpesayw.lawsonengineers.co.",
        "IDS Detections : Suspicious Accept in HTTP POST - Possible Alphacrypt/TeslaCrypt Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "Of note: Alleging Federal Investigator calls target. Found her in Bark? No. He asks for $4G to relocate target in 2 days provide hacker secured iPhone.",
        "2012647\tDropbox.com Offsite File Backup in Use",
        "Ransom:Win32/Tescrypt: FileHash-SHA256 916e13eb1e4313b2a04a2ae21b4955b8228183b26709a64284098ca759a8f437",
        "PWS:Win32/QQpass.B!MTB: FileHash-SHA1 fec703ee7c02ffe35c6b987bb9aac3a765e95dfb",
        "Phone purchased for target by a 'self-proclaimed' W/F PI from Lakewood, Colorado w/o consent/prior knowledge. PI fitful, so target paid for phone.",
        "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
        "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
        "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
        "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
        "I know this isn't a blog. If someone is targeted, every device will be compromised. It's the goal of the attackers. Unwarranted bounty found.",
        "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
        "Ransom:Win32/Haperlock.A: FileHash-MD5 46480bf46cde2b3e79852661cc5c36fc",
        "PWS:Win32/Ymacco.AA50: FileHash-SHA1 57486d33246bce6dfedb0836cd97c9acd4a4a39a",
        "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
        "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
        "http://images.contact.acams.org/",
        "Trojan:Linux/Xorddos: FileHash-MD5 3b4ce1333614cd21c109054630e959b9",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe",
        "gitea.neconsside.com  \u2022 http://f7194.vip/login",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
        "Backdoor:Win32/Fynloski.A: FileHash-SHA256 4e692806955f9ee3f4c7a5d9a1ac7729eb53b855b39e6f9f943f89ccba30bd49",
        "espysite.azurewebsites.net - https://otx.alienvault.com/indicator/hostname/espysite.azurewebsites.net",
        "target.dropboxbusiness.com",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "https://otx.alienvault.com/indicator/ip/162.222.213.199",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
        "TrojanClicker:Win32/Ellell.A: FileHash-SHA1 7a52b57df5b3c67f810a71dc39ff93688b141534",
        "Trojan:Win32/Zombie.A: FileHash-MD5 34e85820b41c14e07dd564f22997e893",
        "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "https://otx.alienvault.com/indicator/ip/63.141.242.45",
        "Fed lost interest after satisfied Sasha wasn't of interest. Target interest to rid self of hackers and stalkers. Inundated with  calls from fake PI's.",
        "CnC IP's: 192.187.111.221  63.141.242.43  63.141.242.44  63.141.242.46 81.17.18.195  81.17.18.197 81.17.29.146  81.17.29.148",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "http://www.northpoleroute.com/78985064&type=0&resid=5312625",
        "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/233e5b27962a141061eff04ae07699d1a2faa8d47077a2da31770a5f59327ee3",
        "192.124.249.187",
        "Ransom:Win32/Haperlock.A; FileHash-SHA256 8264c73f129d4895573c2375ea4e4636b9d5df66852ce72ccc20d31a96ae7df1",
        "Colorado doesn't require a PI licensure. That's a major problem as many stalkers, malicious hackers & the ruthless are drawn to this occupation.",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27",
        "Target admits to ignoring major signs: 'PI' called just before request submitted.Spent hours researching & denouncing targets former 'questionable 'PI",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
        "http://islamicsoftwares.com/downloads/iphone/audioCont/2/107.tar.gz http://islamicsoftwares.com/downloads/iphone/audioCont/7/110.tar.gz",
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "Trojan:Win32/Zombie.A: FileHash-SHA256 0b87667251b79cb800ddd88bdabecea8e13248c426d4a14ae0aae0ef5783f943",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "Alerts: cape_detected_threat cape_extracted_content",
        "Win.Virus.TeslaCrypt3-2: 78af1fd5be62ab829e49f9a1b5fbb8a9b30f8d0804cba5805c8f350b841d522e",
        "PWS:Win32/QQpass.B!MTB: FileHash-SHA256 71fa9257f88c15b438616662dc468327199edb570286c7259d333953006b8eec",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "Backdoor:Win32/Fynloski.A: FileHash-SHA 453355033bb7977831ca87cc90156b594f13b2ee",
        "IDS Detections: Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
        "https://www.9xiuzb.com/activity/activity_pcunion?piusr=t_420",
        "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
        "IDS Detections : W32/Bayrob Attempted Checkin 2 CryptoWall Check-in AlphaCrypt CnC Beacon 4 Trojan-Ransom.Win32.Blocker.avsx",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
        "Trojan:Win32/Zombie.A: FileHash-SHA1 de974c697f0401d681e1bb3c8694a663e9e43d8f",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "https://otx.alienvault.com/indicator/ip/185.230.63.186",
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org",
        "Goal to present targets case, blame & have Sacha removed by board of Colorado attorneys. Widely known firm angrily begins misconduct in her case.",
        "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
        "Antivirus Detections: ELF:Xorddos-AE\\ [Trj] ,  Unix.Trojan.Xorddos-1 ,",
        "https://www.searchw3.com/",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
        "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "'PI' arrives in separate car w/unseen veteran. Points out DV LP to target , states he's not with her. Leads target to restaurant 'to talk'. Stays awhile.",
        "IDS Detections : AlphaCrypt CnC Beacon 3 MalDoc Request for Payload Aug 17 2016 Koobface W32/Bayrob Attempted Checkin",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "Ransomware: message.htm.com",
        "Tulach IP: 114.114.114.114",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "TrojanClicker:Win32/Ellell.A: FileHash-SHA256 7456108771e6a8bac658276c1cb9e18c8c348fdd9cd3538419751c3b5ef3ac02",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
        "smartphonesonline.co.uk  https://smartphonesonline.co.uk/  https://www.smartphonesonline.co.uk/ [192.187.111.222. US - Request HTTP -Target IP]",
        "Found claims PI was a hacker. Brother a hitman. Verbalized non-specific affiliation w/City of Lakewood. Refused to provide target phone passcode.",
        "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
        "Emotionally demands disabled target cash advanced to pay all bills. Denies formerly alleged abilities & skills, still wants $1500 for 4 hours of nothing.",
        "'PI' orders 2 meals. Leaves restaurant a few times. Talks about troubled mother  w/medication addictions. Incredibly emotional vowing to be better.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
        "Self whitelisting tool, domains moved within nginx.",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "Mercenary Attackers / Cellebrite branded as: http://teacellertea.com/Pegasus/ NSO",
        "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
        "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
        "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
        "You can either have a runner or become a hacker. Only  2 choices for targeted individuals. Target needs to become ethical hacker or ethical grey hat, Purple teamer.",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "Metro T-Mobile refuses refund. Allows target to store phone with them in resealed box. When retrieved box opened and tampered with.",
        "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/",
        "PWS:Win32/QQpass.B!MTB: FileHash-MD5 f7c36b4e5b4b09dc369163377aade2d7",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
        "PWS:Win32/Ymacco.AA50: FileHash-SHA256 105834163b1a0c89e12917a3145e14be6030a611e07f7f62fa7c57de838d6251",
        "https://otx.alienvault.com/indicator/file/58d35aa65e820e83be595049b9e5a223ffb1f5f9111b64ccdd2622479cda9e1b",
        "https://otx.alienvault.com/indicator/file/251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
        "tracking.epicgames.com | epicgames.com | https://www.epicgames.com/id/activate",
        "Target knows nothing about assaulter. Chicago Fed  text photo for target to confirm identity of attacker. Be sends a photo of Dr. John T. Sasha."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Neshta",
            "Backdoor:win32/plugx.n!dha",
            "Backdoor:win32/tofsee.t",
            "Worm:win32/ganelp.a",
            "Trojan.shellrunner/emailworm",
            "Win32:trojanx-gen\\ [trj]",
            "Blacknet",
            "Win32:trojan",
            "Trojan:win32/vflooder!rfn",
            "Trojan:win32/pariham.a",
            "Ransom:win32/wannaren.a",
            "Trojan.agent.fryx",
            "Mal_tofsee",
            "Bulz",
            "Trojanspy:win32/nivdort.cw",
            "Win32:dropper",
            "Malwarex",
            "Win32:cleaman-k\\ [trj]",
            "Bayrob",
            "Trojan:linux/xorddos",
            "Ymacco",
            "Ransom.stopcryptpmf.",
            "Nids",
            "Worm:win32/autorun.b",
            "Kentuchy",
            "Trojandownloader:win32/upatre",
            "Virtool:win32/ceeinject.akz!bit",
            "Trojandownloader:win32/upatre.a",
            "Trojan:win32/fakefolder",
            "Trojan:win32/zombie.a",
            "Ransom:win32/stopcrypt.ak!mtb",
            "Tulach malware",
            "Fragtor",
            "Quasar",
            "Win.virus.teslacrypt3-2/custom",
            "Win.malware.jaik-9968280-0",
            "Other malware",
            "Pws:win32/qqpass.b!mtb",
            "Trojanspy",
            "Trojan.redcap/python",
            "Maltiverse",
            "Trojan:win32/qbot.r!mtb",
            "Malware + code overlap",
            "Pegasus for ios - s0289",
            "Alf:heraklezeval:ransom:win32/cve",
            "Mirai",
            "Ransomware",
            "Win32:evo",
            "Win32:acecrypter-b [cryp]",
            "Ransom:win32/tescrypt",
            "#virtool:win32/obfuscator.adb",
            "Pegasus for android - mob-s0032",
            "Worm:win32/autorun.xxy!bit",
            "Bancos",
            "Backdoor:win32/fynloski.a",
            "Trojandropper:win32/bcryptinject.b!msr",
            "Ransom:win32/haperlock.a",
            "Pws:win32/ymacco.aa50",
            "Hematite",
            "Trojanspy:win32/banker.ly",
            "Malwarex-gen",
            "Redline",
            "Asacky",
            "Sakula rat",
            "Trojanclicker:win32/ellell.a",
            "Win32:malwarex",
            "Cl0p",
            "Trojan:win32/blackmon",
            "Zegost",
            "Trojan:bat/musecador",
            "Zbot",
            "Upatre"
          ],
          "industries": [
            "Healthcare",
            "Telecommunications",
            "Civilian society",
            "Networking",
            "Technology",
            "Media"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 18,
  "pulses": [
    {
      "id": "68f80c6bcd3fff3a4f126a68",
      "name": "Sventore \u2022 Agent Tesla Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information ",
      "description": "",
      "modified": "2025-11-20T17:00:05.377000",
      "created": "2025-10-21T22:42:51.657000",
      "tags": [
        "united",
        "urls",
        "domain",
        "files",
        "files ip",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "arial",
        "worm",
        "trojandropper",
        "meta",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "present oct",
        "present jul",
        "present sep",
        "present aug",
        "moved",
        "ip address",
        "error",
        "title",
        "ipv4 add",
        "url analysis",
        "hosting",
        "reverse dns",
        "america flag",
        "name servers",
        "body",
        "a domains",
        "passive dns",
        "welcome",
        "ok server",
        "gmt content",
        "twitter",
        "dynamicloader",
        "write c",
        "medium",
        "myapp",
        "high",
        "host",
        "delphi",
        "write",
        "code",
        "malware",
        "device driver",
        "backdoor",
        "msil",
        "present mar",
        "apanas",
        "regsetvalueexa",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "langturkish",
        "sublangdefault",
        "regdword",
        "persistence",
        "execution",
        "nids",
        "zegost",
        "trojan",
        "win32fugrafa",
        "malwarexgen att",
        "ck ids",
        "t1040",
        "sniffing",
        "location united",
        "united states",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
        "yara rule",
        "search",
        "blobx00x00x00",
        "guard",
        "encrypt",
        "afraid",
        "smartphone",
        "laptop",
        "tablet",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "ascii text",
        "size",
        "mitre att",
        "show technique",
        "refresh",
        "span",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "access att",
        "t1566 phishing",
        "font",
        "pattern match",
        "general",
        "contact",
        "premium",
        "never",
        "core",
        "external system",
        "http header",
        "network traffic",
        "sample",
        "antivirus",
        "systems found",
        "ipurl artifact",
        "network related",
        "sends traffic",
        "http outbound",
        "hostname add",
        "address",
        "registrar",
        "internet ltd",
        "livedomains",
        "creation date",
        "hostname",
        "domain add",
        "modrg",
        "sincpoatia",
        "utf8",
        "appdata",
        "temp",
        "fyfdz",
        "iepgq",
        "trlew",
        "copy",
        "kentuchy",
        "oljnmrfghb",
        "powershell",
        "sabey",
        "sokolove law"
      ],
      "references": [
        "afraid.org | evergreen.afraid.org",
        "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
        "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
        "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
        "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
        "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
        "https://api.strem.io/api/addonCollectionGet%",
        "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
        "aohhpesayw.lawsonengineers.co.",
        "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
        "gitea.neconsside.com  \u2022 http://f7194.vip/login",
        "2012647\tDropbox.com Offsite File Backup in Use",
        "target.dropboxbusiness.com",
        "consolefoundry.date \u2022 http://consolefoundry.date",
        "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Neshta",
          "display_name": "Neshta",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski.A",
          "display_name": "Backdoor:Win32/Fynloski.A",
          "target": "/malware/Backdoor:Win32/Fynloski.A"
        },
        {
          "id": "Zegost",
          "display_name": "Zegost",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        },
        {
          "id": "MalwareX-Gen",
          "display_name": "MalwareX-Gen",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.B",
          "display_name": "Worm:Win32/AutoRun.B",
          "target": "/malware/Worm:Win32/AutoRun.B"
        },
        {
          "id": "Trojan:Win32/Pariham.A",
          "display_name": "Trojan:Win32/Pariham.A",
          "target": "/malware/Trojan:Win32/Pariham.A"
        },
        {
          "id": "Kentuchy",
          "display_name": "Kentuchy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68f7ced2cf17d264b49628bc",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 483,
        "hostname": 1397,
        "URL": 2874,
        "email": 2,
        "FileHash-MD5": 369,
        "FileHash-SHA1": 355,
        "FileHash-SHA256": 1534,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 7021,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "150 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f7ced2cf17d264b49628bc",
      "name": "NIDS - Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information",
      "description": "Multiple malware\u2019s targeting Dropbox & Ebay accounts. Referenced in earlier pukses. Further investigation shows link  found in apps on multiple Apple devices. Afraid. Org  still running & wreaking havoc globally. Currently targets a Music studio in Clear Creek County Co. The signal bounces from Fire station directly to studio gaining full access to everything.\n\nI am very disappointed with the abuses in f the Palantir , Gotham , Foundry products being abused by law firms and Private Investigators.\nIt is very destructive, causing loss, these firms are literally stealing and making money with other people\u2019s intellectual property and tough luck on the actual inventor, artist, writer because they even steal , cancel your insurance or back accounts leaving you unable to make a claim. \n\nGreat discretion should be used to qualify for these tools used to track, terrorize and access private information as well as tarnish the names of civilians , family ,businesses, stalking tracking  known location.",
      "modified": "2025-11-20T17:00:05.377000",
      "created": "2025-10-21T18:20:02.120000",
      "tags": [
        "united",
        "urls",
        "domain",
        "files",
        "files ip",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "arial",
        "worm",
        "trojandropper",
        "meta",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "present oct",
        "present jul",
        "present sep",
        "present aug",
        "moved",
        "ip address",
        "error",
        "title",
        "ipv4 add",
        "url analysis",
        "hosting",
        "reverse dns",
        "america flag",
        "name servers",
        "body",
        "a domains",
        "passive dns",
        "welcome",
        "ok server",
        "gmt content",
        "twitter",
        "dynamicloader",
        "write c",
        "medium",
        "myapp",
        "high",
        "host",
        "delphi",
        "write",
        "code",
        "malware",
        "device driver",
        "backdoor",
        "msil",
        "present mar",
        "apanas",
        "regsetvalueexa",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "langturkish",
        "sublangdefault",
        "regdword",
        "persistence",
        "execution",
        "nids",
        "zegost",
        "trojan",
        "win32fugrafa",
        "malwarexgen att",
        "ck ids",
        "t1040",
        "sniffing",
        "location united",
        "united states",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
        "yara rule",
        "search",
        "blobx00x00x00",
        "guard",
        "encrypt",
        "afraid",
        "smartphone",
        "laptop",
        "tablet",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "ascii text",
        "size",
        "mitre att",
        "show technique",
        "refresh",
        "span",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "access att",
        "t1566 phishing",
        "font",
        "pattern match",
        "general",
        "contact",
        "premium",
        "never",
        "core",
        "external system",
        "http header",
        "network traffic",
        "sample",
        "antivirus",
        "systems found",
        "ipurl artifact",
        "network related",
        "sends traffic",
        "http outbound",
        "hostname add",
        "address",
        "registrar",
        "internet ltd",
        "livedomains",
        "creation date",
        "hostname",
        "domain add",
        "modrg",
        "sincpoatia",
        "utf8",
        "appdata",
        "temp",
        "fyfdz",
        "iepgq",
        "trlew",
        "copy",
        "kentuchy",
        "oljnmrfghb",
        "powershell",
        "sabey",
        "sokolove law"
      ],
      "references": [
        "afraid.org | evergreen.afraid.org",
        "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
        "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
        "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
        "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
        "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
        "https://api.strem.io/api/addonCollectionGet%",
        "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
        "aohhpesayw.lawsonengineers.co.",
        "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
        "gitea.neconsside.com  \u2022 http://f7194.vip/login",
        "2012647\tDropbox.com Offsite File Backup in Use",
        "target.dropboxbusiness.com",
        "consolefoundry.date \u2022 http://consolefoundry.date",
        "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Neshta",
          "display_name": "Neshta",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski.A",
          "display_name": "Backdoor:Win32/Fynloski.A",
          "target": "/malware/Backdoor:Win32/Fynloski.A"
        },
        {
          "id": "Zegost",
          "display_name": "Zegost",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        },
        {
          "id": "MalwareX-Gen",
          "display_name": "MalwareX-Gen",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.B",
          "display_name": "Worm:Win32/AutoRun.B",
          "target": "/malware/Worm:Win32/AutoRun.B"
        },
        {
          "id": "Trojan:Win32/Pariham.A",
          "display_name": "Trojan:Win32/Pariham.A",
          "target": "/malware/Trojan:Win32/Pariham.A"
        },
        {
          "id": "Kentuchy",
          "display_name": "Kentuchy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 483,
        "hostname": 1397,
        "URL": 2874,
        "email": 2,
        "FileHash-MD5": 369,
        "FileHash-SHA1": 355,
        "FileHash-SHA256": 1534,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 7021,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "150 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68eff833ed84ceaf611521d2",
      "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
      "description": "",
      "modified": "2025-10-15T19:38:27.739000",
      "created": "2025-10-15T19:38:27.739000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": "68c73fbd85dfbb4d41006ad1",
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "186 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c73fbd85dfbb4d41006ad1",
      "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
      "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
      "modified": "2025-10-14T22:26:18.109000",
      "created": "2025-09-14T22:20:45.617000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "187 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68743733a69ce827f6156f5c",
      "name": "W3.org | Google Spy engine | Tracking, Malware Repository | www.W3.org https://www.searchw3.com/ > ww.google.com.uy",
      "description": "",
      "modified": "2025-07-13T22:46:11.685000",
      "created": "2025-07-13T22:46:11.685000",
      "tags": [
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "expired",
        "acceptencoding",
        "html info",
        "title home",
        "tags viewport",
        "trackers google",
        "tag manager",
        "gsddf3d2bzf",
        "historical ssl",
        "referrer",
        "december",
        "formbook",
        "round",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "collection",
        "vt graph",
        "socgholish",
        "blister",
        "hacktool",
        "hiddentear",
        "gootloader",
        "agent tesla",
        "crypto",
        "installer",
        "life",
        "malware",
        "open",
        "korplug",
        "tofsee",
        "date",
        "name servers",
        "status",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "pulse submit",
        "url analysis",
        "files",
        "no data",
        "tag count",
        "analyzer threat",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "heur",
        "cisco umbrella",
        "alexa top",
        "million",
        "site",
        "alexa",
        "maltiverse",
        "xcnfe",
        "safe site",
        "phishing",
        "remcos",
        "malicious",
        "miner",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "trojan",
        "detplock",
        "artemis",
        "networm",
        "win64",
        "redline stealer",
        "limerat",
        "venom rat",
        "trojanspy",
        "tld count",
        "png image",
        "jpeg image",
        "rgba",
        "exif standard",
        "tiff image",
        "pattern match",
        "ascii text",
        "united",
        "jfif",
        "sha1",
        "core",
        "general",
        "starfield",
        "hybrid",
        "local",
        "encrypt",
        "click",
        "strings",
        "adobea",
        "daga",
        "as30148 sucuri",
        "td tr",
        "search",
        "span td",
        "as44273 host",
        "creation date",
        "a domains",
        "xtra",
        "meta",
        "back",
        "verdict",
        "domain",
        "aaaa",
        "as15169 google",
        "asnone united",
        "nxdomain",
        "sucuri security",
        "a li",
        "span",
        "class",
        "body",
        "sucuri website",
        "a div",
        "authority",
        "record value",
        "showing",
        "gmt content",
        "x sucuri",
        "high",
        "related pulses",
        "show",
        "guard",
        "entries",
        "win32",
        "west domains",
        "next",
        "ipv4",
        "asnone germany",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "formbook cnc",
        "checkin",
        "found",
        "error",
        "code",
        "create c",
        "read c",
        "delete",
        "write",
        "default",
        "dock",
        "execution",
        "copy",
        "xport",
        "firewall",
        "body doctype",
        "section",
        "dcrat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "url https",
        "blacklist",
        "cl0p ransomware",
        "zbot",
        "malware site",
        "team memscan",
        "cl0p",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus starizona",
        "cngo daddy",
        "g2 validity",
        "subject public",
        "key info",
        "certificate",
        "whois lookup",
        "netrange",
        "nethandle",
        "net192",
        "net1920000",
        "as174",
        "as3257",
        "sucuri",
        "sucur2",
        "verisign",
        "whois database",
        "server",
        "registrar abuse",
        "icann whois",
        "whois status",
        "registrar iana",
        "form",
        "temple",
        "first",
        "android",
        "win32 exe",
        "html",
        "bobby fischer",
        "office open",
        "detections type",
        "name",
        "pdf dealer",
        "price list",
        "pdf my",
        "crime",
        "taiwan unknown",
        "as3462",
        "as131148 bank",
        "as21342",
        "all search",
        "otx scoreblue",
        "pulse pulses",
        "cname",
        "as22612",
        "as43350 nforce",
        "win32upatre jun",
        "expiration date",
        "hostname",
        "lowfi",
        "date hash",
        "avast avg",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jun",
        "files show",
        "registrar",
        "china unknown",
        "title",
        "network",
        "fakedout threat",
        "urls http",
        "maltiverse safe",
        "malicious url",
        "team",
        "phishtank",
        "services",
        "botnet command",
        "control server",
        "mining",
        "betabot",
        "team malware",
        "engineering",
        "stealer",
        "service",
        "vawtrak",
        "virut",
        "emotet",
        "simda",
        "redline",
        "fri oct",
        "media sharing",
        "known infection source",
        "bot networks",
        "malware",
        "malware repository",
        "spyware"
      ],
      "references": [
        "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
        "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
        "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
        "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
        "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
        "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
        "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
        "IP\u2019s Contacted: 192.124.249.187",
        "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
        "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
        "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6688e0ffb31d4881f3238713",
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 4080,
        "URL": 11952,
        "hostname": 4638,
        "domain": 4301,
        "FileHash-MD5": 2236,
        "FileHash-SHA1": 1140,
        "CVE": 8,
        "SSLCertFingerprint": 20,
        "email": 8,
        "CIDR": 1
      },
      "indicator_count": 28384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "280 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66804428b487338dc16f70a7",
      "name": "Brian Sabey Orbiting Tsara Brashears and associates | Espionage | Said client: Jeffrey Reimer",
      "description": "Brian Sabey & large team continue excessive orbiting target & family members in multiple states. \nUnwarranted, dangerous and illegal. \nLarge attacks have wreaked havoc on medical establishments, targets medical profile, once profitable business, legal manipulation, financial well being. forced poverty, swatting, imfostealer, insurance fraud, intellectual property use, Audi le spying, in person stalking, confrontations, great bodily harm, loss of peace, safety. basic human rights and privacy, phone call redirection, malvertising. In the name of assaulter Jeffrey Scott Reimer",
      "modified": "2024-11-05T10:00:12.606000",
      "created": "2024-06-29T17:28:08.283000",
      "tags": [
        "unknown",
        "united",
        "virgin islands",
        "as51852",
        "as33387",
        "as19905",
        "as44273 host",
        "cname",
        "nxdomain",
        "passive dns",
        "url http",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "entries",
        "urls",
        "files ip",
        "address domain",
        "ip related",
        "pulses otx",
        "pulses",
        "related tags",
        "indicator facts",
        "dga domain",
        "http",
        "unique",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "ip address",
        "related nids",
        "log id",
        "gmtn",
        "go daddy",
        "authority",
        "tls web",
        "arizona",
        "scottsdale",
        "ca issuers",
        "b59bn timestamp",
        "ff2c217402202b",
        "code",
        "false",
        "url https",
        "domain",
        "trojan",
        "hostname",
        "files",
        "body",
        "date",
        "path max",
        "age86400 set",
        "cookie",
        "script urls",
        "type",
        "mtb may",
        "script script",
        "trojanspy",
        "striven",
        "miles2",
        "rexxfield",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "date sat",
        "gmt server",
        "sakula malware",
        "historical ssl",
        "realteck audio",
        "lemon duck",
        "iocs",
        "tsara brashears",
        "loki password",
        "stealer",
        "windows",
        "auction",
        "metro",
        "core",
        "colibri loader",
        "hacktool",
        "status",
        "for privacy",
        "creation date",
        "record value",
        "name servers",
        "showing",
        "next",
        "mtb mar",
        "ipv4",
        "ransom",
        "west domains",
        "redacted for",
        "gmt location",
        "gmt max",
        "cowboy",
        "encrypt",
        "as60558 phoenix",
        "susp",
        "win32",
        "methodpost",
        "canada unknown",
        "as43350 nforce",
        "united kingdom",
        "as47846",
        "germany unknown",
        "briansabey",
        "body doubles",
        "orbiters",
        "malvertising",
        "cane",
        "get na",
        "show",
        "as16509",
        "delete c",
        "sinkhole cookie",
        "value snkz",
        "cape",
        "possible",
        "copy",
        "nivdort",
        "write",
        "bayrob",
        "malware",
        "exploit",
        "confirm https",
        "impact",
        "misc http",
        "cvss v2",
        "authentication",
        "n cvss",
        "v3 severity",
        "high attack",
        "emails",
        "cnc",
        "alphacrypt cnc",
        "beacon",
        "as15169 google",
        "limited",
        "as8560",
        "elite",
        "AS33387 nocix llc",
        "pegasus",
        "mercenary",
        "cellerebrand",
        "cellebrite",
        "apple",
        "dark",
        "apple ios",
        "ios",
        "apple iphone",
        "apple itunes",
        "itunes",
        "pegasystem",
        "data brokers",
        "hackers",
        "javascript",
        "please",
        "intel",
        "filehash",
        "av detections",
        "xorddos"
      ],
      "references": [
        "http://www.northpoleroute.com/78985064&type=0&resid=5312625",
        "espysite.azurewebsites.net - https://otx.alienvault.com/indicator/hostname/espysite.azurewebsites.net",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256 aa289c89f2cdbfe896f4c77c611d94aa95858797014b57e24d5fe2bb0997d7b0",
        "Ransom:Win32/Haperlock.A: FileHash-MD5 46480bf46cde2b3e79852661cc5c36fc",
        "Ransom:Win32/Haperlock.A: FileHash-SHA1 c881d1434164b35fb16107a25f84995b7fdef37f",
        "Ransom:Win32/Haperlock.A; FileHash-SHA256 8264c73f129d4895573c2375ea4e4636b9d5df66852ce72ccc20d31a96ae7df1",
        "IDS Detections: W32/Bayrob Attempted Checkin 2 Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin",
        "IDS Detections: Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "Alerts: cape_detected_threat cape_extracted_content",
        "https://otx.alienvault.com/indicator/file/251150379b9a0ff230899777f0952d3833a88c1a2d6a0101ea13bdd91a9550fe",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "\"Windows SMB Information Disclosure Vulnerability.\" - https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "Backdoor:Win32/Fynloski.A: FileHash-SHA256 4e692806955f9ee3f4c7a5d9a1ac7729eb53b855b39e6f9f943f89ccba30bd49",
        "Backdoor:Win32/Fynloski.A: FileHash-SHA 453355033bb7977831ca87cc90156b594f13b2ee",
        "Backdoor:Win32/Fynloski.A: FileHash-MD5 c3113684e8f8aa6d1b1b67d59141e845",
        "TrojanClicker:Win32/Ellell.A: FileHash-SHA256 7456108771e6a8bac658276c1cb9e18c8c348fdd9cd3538419751c3b5ef3ac02",
        "TrojanClicker:Win32/Ellell.A: FileHash-SHA1 7a52b57df5b3c67f810a71dc39ff93688b141534",
        "TrojanClicker:Win32/Ellell.A: 4d3e7d486ec5918d91e54e51c4d07dc6",
        "PWS:Win32/Ymacco.AA50: FileHash-SHA256 105834163b1a0c89e12917a3145e14be6030a611e07f7f62fa7c57de838d6251",
        "PWS:Win32/Ymacco.AA50: FileHash-SHA1 57486d33246bce6dfedb0836cd97c9acd4a4a39a",
        "PWS:Win32/Ymacco.AA50: FileHash-MD5 5739cd62eb88e2a7e514784fe7cf5ca4",
        "https://otx.alienvault.com/indicator/ip/162.222.213.199",
        "TrojanDownloader:Win32/PurityScan.MI!MTB: FileHash-SHA1 58ba8715a88d883537ba8d0e20eea2a4d9269cad",
        "Ransom:Win32/Tescrypt: FileHash-SHA256 916e13eb1e4313b2a04a2ae21b4955b8228183b26709a64284098ca759a8f437",
        "PWS:Win32/QQpass.B!MTB: FileHash-SHA256 71fa9257f88c15b438616662dc468327199edb570286c7259d333953006b8eec",
        "PWS:Win32/QQpass.B!MTB: FileHash-SHA1 fec703ee7c02ffe35c6b987bb9aac3a765e95dfb",
        "PWS:Win32/QQpass.B!MTB: FileHash-MD5 f7c36b4e5b4b09dc369163377aade2d7",
        "Trojan:Win32/Zombie.A: FileHash-SHA256 0b87667251b79cb800ddd88bdabecea8e13248c426d4a14ae0aae0ef5783f943",
        "Trojan:Win32/Zombie.A: FileHash-SHA1 de974c697f0401d681e1bb3c8694a663e9e43d8f",
        "Trojan:Win32/Zombie.A: FileHash-MD5 34e85820b41c14e07dd564f22997e893",
        "Win.Virus.TeslaCrypt3-2: 78af1fd5be62ab829e49f9a1b5fbb8a9b30f8d0804cba5805c8f350b841d522e",
        "IDS Detections : W32/Bayrob Attempted Checkin 2 CryptoWall Check-in AlphaCrypt CnC Beacon 4 Trojan-Ransom.Win32.Blocker.avsx",
        "IDS Detections : AlphaCrypt CnC Beacon 3 MalDoc Request for Payload Aug 17 2016 Koobface W32/Bayrob Attempted Checkin",
        "IDS Detections : Suspicious Accept in HTTP POST - Possible Alphacrypt/TeslaCrypt Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
        "https://otx.alienvault.com/indicator/ip/185.230.63.186",
        "CnC IP's: 192.187.111.221  63.141.242.43  63.141.242.44  63.141.242.46 81.17.18.195  81.17.18.197 81.17.29.146  81.17.29.148",
        "http://islamicsoftwares.com/downloads/iphone/audioCont/2/107.tar.gz http://islamicsoftwares.com/downloads/iphone/audioCont/7/110.tar.gz",
        "smartphonesonline.co.uk  https://smartphonesonline.co.uk/  https://www.smartphonesonline.co.uk/ [192.187.111.222. US - Request HTTP -Target IP]",
        "Mercenary Attackers / Cellebrite branded as: http://teacellertea.com/Pegasus/ NSO",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
        "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
        "https://otx.alienvault.com/indicator/file/0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
        "https://otx.alienvault.com/indicator/ip/63.141.242.45",
        "Yara Detections: is__elf ,  xorddos ,  LinuxXorDDoS_VariantTwo",
        "Antivirus Detections: ELF:Xorddos-AE\\ [Trj] ,  Unix.Trojan.Xorddos-1 ,",
        "Trojan:Linux/Xorddos: FileHash-MD5 3b4ce1333614cd21c109054630e959b9",
        "Trojan:Linux/Xorddos:  FileHash-SHA1 a5780498e6fce5933a7e7bf59a6fa5742e97f559",
        "Trojan:Linux/Xorddos: FileHash-SHA256 0002f7cbc10cfea832f117d66dea2d33e6ca1d5cea57d9af0784255e0112d658",
        "https://hallrender.com/attorney/brian-sabey"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort.CW",
          "display_name": "TrojanSpy:Win32/Nivdort.CW",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
        },
        {
          "id": "Ransom:Win32/Haperlock.A",
          "display_name": "Ransom:Win32/Haperlock.A",
          "target": "/malware/Ransom:Win32/Haperlock.A"
        },
        {
          "id": "Backdoor:Win32/Fynloski.A",
          "display_name": "Backdoor:Win32/Fynloski.A",
          "target": "/malware/Backdoor:Win32/Fynloski.A"
        },
        {
          "id": "TrojanClicker:Win32/Ellell.A",
          "display_name": "TrojanClicker:Win32/Ellell.A",
          "target": "/malware/TrojanClicker:Win32/Ellell.A"
        },
        {
          "id": "Bayrob",
          "display_name": "Bayrob",
          "target": null
        },
        {
          "id": "Win.Virus.TeslaCrypt3-2/Custom",
          "display_name": "Win.Virus.TeslaCrypt3-2/Custom",
          "target": null
        },
        {
          "id": "PWS:Win32/Ymacco.AA50",
          "display_name": "PWS:Win32/Ymacco.AA50",
          "target": "/malware/PWS:Win32/Ymacco.AA50"
        },
        {
          "id": "Ransom:Win32/Tescrypt",
          "display_name": "Ransom:Win32/Tescrypt",
          "target": "/malware/Ransom:Win32/Tescrypt"
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Pegasus for iOS - S0289",
          "display_name": "Pegasus for iOS - S0289",
          "target": null
        },
        {
          "id": "Pegasus for Android - MOB-S0032",
          "display_name": "Pegasus for Android - MOB-S0032",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Trojan:Linux/Xorddos",
          "display_name": "Trojan:Linux/Xorddos",
          "target": "/malware/Trojan:Linux/Xorddos"
        },
        {
          "id": "Sakula RAT",
          "display_name": "Sakula RAT",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1506",
          "name": "Web Session Cookie",
          "display_name": "T1506 - Web Session Cookie"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1051",
          "name": "Shared Webroot",
          "display_name": "T1051 - Shared Webroot"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 106,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 3885,
        "hostname": 1651,
        "URL": 5981,
        "FileHash-MD5": 486,
        "FileHash-SHA256": 3859,
        "SSLCertFingerprint": 2,
        "FileHash-SHA1": 487,
        "CVE": 7,
        "email": 8
      },
      "indicator_count": 16366,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "530 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66c08b488620dac7697026c7",
      "name": "Fakefolder | Ransom:Win32/CVE affecting HCA Healthcare cloud",
      "description": "Cloud computing - User Acceptance Testing (UAT)\napparently used by HCA one of the nations leading healthcare providers. It's seems HCA's cloud is compromised. The cloud has a number of high priority vulnerabilities, malware, ransomware, zero day, etc.  Patient accounts aiming involved, (some patients received letters of serious PII, PHI compromise) lost records, patient blacklisting, hacking, and nefarious manipulations by providers. I've been made aware of CORHIO closing compromised patient accounts. Some patients account access and data has reportedly been lost.\n#VirTool:Win32/Obfuscator.ADB\nALF:HeraklezEval:Ransom:Win32/CVE\nRansom:Win32/StopCrypt.AK!MTB\nRansom:Win32/Wannaren.A\nTrojan:Win32/BlackMon\nTrojan:Win32/Fakefolder\nTulach Malware",
      "modified": "2024-10-15T14:02:54.772000",
      "created": "2024-08-17T11:36:40.810000",
      "tags": [
        "microsoft edge",
        "iocs",
        "alberta ndp",
        "security",
        "vc rescue",
        "disk",
        "apple",
        "google",
        "windows",
        "powershell",
        "security https",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "sample",
        "detection list",
        "site",
        "cisco umbrella",
        "alexa top",
        "blacklist",
        "million",
        "mail spammer",
        "firehol",
        "ip address",
        "noname057",
        "anonymizer",
        "firehol proxy",
        "proxy",
        "india mail",
        "malware",
        "full name",
        "first",
        "v3 serial",
        "number",
        "cus odigicert",
        "global tls",
        "rsa4096 sha256",
        "ca1 validity",
        "subject public",
        "key info",
        "dns replication",
        "date",
        "script script",
        "as12912",
        "a domains",
        "a li",
        "poland unknown",
        "t mobile",
        "domains",
        "przejd",
        "passive dns",
        "authority",
        "meta",
        "accept",
        "cname",
        "record type",
        "ttl value",
        "aaaa",
        "poland",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "files",
        "location poland",
        "asnone united",
        "moved",
        "location",
        "vary",
        "accept encoding",
        "content type",
        "virtool",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "search",
        "date hash",
        "next",
        "showing",
        "as39198",
        "body",
        "window",
        "certificate",
        "hostname",
        "unknown",
        "red bull",
        "script urls",
        "as2828 verizon",
        "ireland unknown",
        "gmt content",
        "as8068",
        "as8075",
        "servers",
        "creation date",
        "united",
        "trojan",
        "trojan features",
        "win32",
        "msr aug",
        "urls",
        "reverse dns",
        "trojandropper",
        "historical ssl",
        "referrer",
        "infiltrate",
        "threat network",
        "malicious",
        "snapchat",
        "eternal blue",
        "sneaky simay",
        "groups",
        "covert",
        "probe",
        "whois lookup",
        "domain name",
        "united",
        "as15169 google",
        "a nxdomain",
        "germany",
        "dynamicloader",
        "yara rule",
        "high",
        "medium",
        "port",
        "dynamic",
        "domain",
        "file name",
        "pcap",
        "copy",
        "url host",
        "port method",
        "user agent",
        "okrnserver",
        "002000",
        "hit tcpmemhit",
        "algorithm",
        "data",
        "cus oentrust",
        "entrust",
        "l1k validity",
        "cpl lwarszawa",
        "ot mobile",
        "status",
        "name servers",
        "as6354",
        "mtb aug",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "usage",
        "info",
        "location united",
        "win32 exe",
        "pe32 executable",
        "ms windows",
        "intel",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "vs2010",
        "info compiler",
        "products",
        "vs2008",
        "header intel",
        "name md5",
        "type",
        "language",
        "ascii text",
        "cyrillic",
        "registrar of",
        "domain names",
        "ii llc",
        "contacted",
        "file type",
        "mb file",
        "graph",
        "ip detections",
        "country",
        "type name",
        "network",
        "tsara brashears",
        "december",
        "typhon reborn",
        "speakez securus",
        "hacktool",
        "emotet",
        "formbook",
        "critical",
        "installer",
        "tofsee",
        "hiddentear",
        "cnc",
        "email collection",
        "apple data",
        "data collection",
        "tsara brashears",
        "for privacy",
        "record value",
        "emails",
        "expiration date",
        "swipper",
        "tulach",
        "aitm",
        "query",
        "observed dns",
        "activity dns",
        "total",
        "google llc",
        "pe32",
        "write",
        "april",
        "defender",
        "otx telemetry",
        "win32cve aug",
        "polska s",
        "copyright",
        "levelblue",
        "dashboard",
        "pulse submit",
        "url analysis",
        "as20940",
        "as16625 akamai",
        "entrustdns",
        "france",
        "entries",
        "refresh",
        "443 ma2592000",
        "net174",
        "net1740000",
        "mcics",
        "read c",
        "write c",
        "tlsv1",
        "default",
        "module load",
        "execution",
        "dock",
        "persistence",
        "xport",
        "redacted for",
        "privacy tech",
        "privacy admin",
        "organization",
        "postal code",
        "stateprovince",
        "server",
        "registrar abuse",
        "code",
        "high priority",
        "critical",
        "CVE-2023-29059"
      ],
      "references": [
        "uat.drw.hcahealthcare.cloud | developers.t-mobile.pl | kwvjuemg.exe",
        "uat.drw.hcahealthcare.cloud US Admin Email: cd2fa1f805494bc7s@ehc.com Admin Organization: HCA - Information Technology & Services, Inc.",
        "Antivirus Detections: Ransom:Win32/Wannaren.A UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX Alerts procmem_yara creates_largekey process_creation_suspicious_location network_bind deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window cape_extracted_content injection_rwx network_http",
        "Yara Detections: LZMA ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , UPXv20MarkusLaszloReiser , UPX",
        "Alerts: procmem_yara creates_largekey process_creation_suspicious_location network_bind cape_extracted_content",
        "Alerts: deletes_executed_files dead_connect dynamic_function_loading encrypted_ioc http_request injection_rwx network_http",
        "Alerts: network_cnc_https_generic powershell_download powershell_request enumerates_running_processes stealth_window",
        "nr-data.net [Apple Private Data Collection]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://twitter.com/PORNO_SEXYBABES | twitter.com | www.pornhub.com | www.anyxxxtube.net",
        "Apple path:https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 | itunes.apple.com",
        "record-viewer-application.hcahealthcare.cloud",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowled",
        "Tulach IP: 114.114.114.114",
        "Antivirus Detections: #VirTool:Win32/Obfuscator.ADB | IDS Detections:Observed DNS Query to .biz TLD | Domains Contacted: pywolwnvd.biz",
        "Yara Detections: SUSP_Unsigned_GoogleUpdate OriginalFilenameGoogleUpdate.exe | Alerts cape_extracted_content",
        "Parent: NET174 (NET-174-0-0-0-0) NetType: Direct Allocation Organization: Verizon Business (MCICS) 'Swipper'",
        "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059\\",
        "cvename.cg | https://cve.mitre.org/cgi | https://cve.mitre.org/cgi-bin/cvename.cg... | https://cve.mitre.org/cgi-bin/cvename.cgi?nam...",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | https://cve.mitre.org/css/main.css",
        "https://cve.mitre.org/images/cvelogobanner.png | https://cve.mitre.org/images/linkedin.jpg | https://cve.mitre.org/images/medium.png",
        "https://cve.mitre.org/images/nvd-logo.png | https://cve.mitre.org/images/search_icon.png | https://cve.mitre.org/images/twitter.jpg",
        "https://cve.mitre.org/images/youtube.png | https://cve.mitre.org/includes/browserheight.js | https://cve.mitre.org/includes/jquery-3.2.1.min.js",
        "https://cve.mitre.org/css/print.css | https://cve.mitre.org/favicon.ico | https://cve.mitre.org/images/GitHub_round_sm",
        "https://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js | https://cve.mitre.org/includes/printerfriendly.js | cve.mitre.org"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/BlackMon",
          "display_name": "Trojan:Win32/BlackMon",
          "target": "/malware/Trojan:Win32/BlackMon"
        },
        {
          "id": "Trojan:Win32/Fakefolder",
          "display_name": "Trojan:Win32/Fakefolder",
          "target": "/malware/Trojan:Win32/Fakefolder"
        },
        {
          "id": "Ransom:Win32/Wannaren.A",
          "display_name": "Ransom:Win32/Wannaren.A",
          "target": "/malware/Ransom:Win32/Wannaren.A"
        },
        {
          "id": "Ransom:Win32/StopCrypt.AK!MTB",
          "display_name": "Ransom:Win32/StopCrypt.AK!MTB",
          "target": "/malware/Ransom:Win32/StopCrypt.AK!MTB"
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology",
        "Civilian Society",
        "Telecommunications",
        "Networking"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1975,
        "FileHash-SHA1": 1731,
        "FileHash-SHA256": 4646,
        "URL": 636,
        "domain": 283,
        "hostname": 798,
        "email": 12,
        "CVE": 3,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 10086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "669e42fea462f0c8f8db32a1",
      "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
      "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
      "modified": "2024-08-21T11:03:59.106000",
      "created": "2024-07-22T11:31:10.391000",
      "tags": [
        "historical ssl",
        "referrer",
        "fancy bear",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "reverse dns",
        "open",
        "status",
        "name servers",
        "creation date",
        "search",
        "proofpoint",
        "expiration date",
        "div div",
        "date",
        "accept",
        "next",
        "united",
        "cname",
        "asnone united",
        "a nxdomain",
        "domain",
        "united kingdom",
        "servers",
        "showing",
        "nxdomain",
        "dname",
        "whitelisted",
        "aaaa",
        "script urls",
        "costa rica",
        "script domains",
        "msie",
        "chrome",
        "unknown",
        "body",
        "gmt content",
        "all scoreblue",
        "pulse pulses",
        "entries",
        "as8987 amazon",
        "as20940",
        "hostname",
        "gartner",
        "crowdstrike",
        "business value",
        "magic quadrant",
        "customer",
        "realized",
        "assessment",
        "economic impact",
        "complete",
        "february",
        "utc na",
        "ver2",
        "msclkidn",
        "html info",
        "meta tags",
        "mobileoptimized",
        "adobe dynamic",
        "tag management",
        "utc bing",
        "cobalt strike",
        "communications",
        "android device",
        "neutral",
        "win32 exe",
        "pe32",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "sections",
        "rticon neutral",
        "ico rtgroupicon",
        "xml rtmanifest",
        "overlay",
        "threat roundup",
        "pandas",
        "attacks against",
        "southeast",
        "wannacry kill",
        "switch dns",
        "query",
        "high level",
        "hackers",
        "unknown win",
        "core",
        "ascii text",
        "sha256",
        "sha1",
        "size",
        "pattern match",
        "suricata stream",
        "command decode",
        "utf8 text",
        "mitre att",
        "path",
        "hybrid",
        "starfield",
        "meta",
        "general",
        "target",
        "local",
        "click",
        "strings",
        "trident",
        "legacy",
        "main",
        "contact",
        "flow t1574",
        "dll sideloading",
        "create",
        "modify system",
        "process t1543",
        "windows service",
        "t1055 system",
        "pe file",
        "t1497 query",
        "may sleep",
        "allocate rwx",
        "get file",
        "access",
        "windows event",
        "allocate",
        "link function",
        "windows link",
        "contains pdb",
        "dns resolutions",
        "ip traffic",
        "pattern domains",
        "memory pattern",
        "urls tcp",
        "hashes",
        "user",
        "file system",
        "written c",
        "samplepath",
        "files dropped",
        "userprofile",
        "registry keys",
        "registry",
        "set registrya",
        "conhost",
        "comspec",
        "created",
        "temp",
        "windows",
        "displayname",
        "process",
        "commands",
        "signals mutexes",
        "mutexes",
        "full name",
        "data",
        "v3 serial",
        "number",
        "cus cndigicert",
        "tls rsa",
        "ca1 odigicert",
        "inc validity",
        "subject public",
        "certificate",
        "whois lookup",
        "netrange",
        "nethandle",
        "net148",
        "net1480000",
        "as16509",
        "as22843",
        "as13916",
        "form",
        "server",
        "registrar abuse",
        "email",
        "request email",
        "verisign",
        "icann whois",
        "tech",
        "first",
        "project skynet",
        "cyber army",
        "dynamicloader",
        "high",
        "delete c",
        "show",
        "username",
        "medium",
        "default",
        "yara detections",
        "worm",
        "copy",
        "write",
        "duptwux",
        "malware",
        "x82xd4",
        "kx81xdbx0f",
        "x86xd3",
        "xa1xf1",
        "xe8xc2x14",
        "wx99xcdx11",
        "regsetvalueexa",
        "regbinary",
        "xe8xc6x13",
        "hx88x9ax1e",
        "stream",
        "win32",
        "persistence",
        "execution",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "ftp username",
        "contacted",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "severity",
        "null",
        "refresh",
        "span",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "robtex",
        "apple ios",
        "apple",
        "domains",
        "co number",
        "virtual mobile",
        "logistics",
        "cyber defense",
        "twitter",
        "read c",
        "artemis",
        "intel",
        "steals",
        "virustotal",
        "python",
        "panda",
        "falcon sandbox",
        "analysis",
        "hybrid analysis",
        "submission name",
        "av detection",
        "multi scan",
        "highest",
        "ability",
        "execute",
        "upgrade",
        "intelligence",
        "learn",
        "reports",
        "logo analysis",
        "size17kib type",
        "command",
        "found",
        "layer protocol",
        "osi application",
        "ip address",
        "t1105 ingress",
        "tool transfer",
        "problems",
        "threat network",
        "infrastructure",
        "domains part",
        "domain tracker",
        "roundup",
        "new problems",
        "startpage",
        "e1203 windows",
        "catalog tree",
        "analysis ob0001",
        "b0001 process",
        "b0003 delayed",
        "analysis ob0002",
        "evasion ob0006",
        "ob0007 system",
        "e1082 file",
        "e1083 impact",
        "data manipulation",
        "remote system",
        "discovery",
        "t1059 accept",
        "modules t1129",
        "enumerate",
        "as2914 ntt",
        "access denied",
        "as16625 akamai",
        "germany unknown",
        "csccorpdomains",
        "as31109",
        "invalid url",
        "mirai",
        "port",
        "destination",
        "bad login",
        "suspicious path",
        "nids",
        "tcp syn",
        "root account",
        "cve20185723",
        "as8068",
        "please",
        "x msedge",
        "embeddedwb",
        "windows nt",
        "tofsee",
        "push",
        "as54113",
        "as396982 google",
        "as31898 oracle",
        "moved",
        "encrypt"
      ],
      "references": [
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "http://images.contact.acams.org/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "Trojan.Agent.FRYX",
          "display_name": "Trojan.Agent.FRYX",
          "target": null
        },
        {
          "id": "Win32:AceCrypter-B [Cryp]",
          "display_name": "Win32:AceCrypter-B [Cryp]",
          "target": null
        },
        {
          "id": "Mal_Tofsee",
          "display_name": "Mal_Tofsee",
          "target": null
        },
        {
          "id": "Ransom.StopcryptPMF.",
          "display_name": "Ransom.StopcryptPMF.",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Worm:Win32/Ganelp.A",
          "display_name": "Worm:Win32/Ganelp.A",
          "target": "/malware/Worm:Win32/Ganelp.A"
        },
        {
          "id": "trojan.shellrunner/emailworm",
          "display_name": "trojan.shellrunner/emailworm",
          "target": null
        },
        {
          "id": "trojan.redcap/python",
          "display_name": "trojan.redcap/python",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1569",
          "name": "System Services",
          "display_name": "T1569 - System Services"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1565",
          "name": "Data Manipulation",
          "display_name": "T1565 - Data Manipulation"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1202",
          "name": "Indirect Command Execution",
          "display_name": "T1202 - Indirect Command Execution"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 890,
        "FileHash-SHA1": 853,
        "FileHash-SHA256": 7215,
        "domain": 2771,
        "hostname": 5544,
        "URL": 13393,
        "email": 12,
        "SSLCertFingerprint": 15,
        "CIDR": 1,
        "CVE": 3
      },
      "indicator_count": 30697,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 237,
      "modified_text": "606 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6688e142f0c8f5ddecbc788c",
      "name": "Google Spy engine | Tracking, Malware Repository",
      "description": "www.W3.org https://www.searchw3.com/ >  ww.google.com.uy. All tags auto populated. Did not spend time documenting all as pulse is quite large. I was able to prove the the compromises are active. I will make much smaller reports.\n(Botnet Commands, Google Spy engine | Tracking, Malware Repository, Stealer, iPhone unlocker)",
      "modified": "2024-08-05T04:01:42.283000",
      "created": "2024-07-06T06:16:34.388000",
      "tags": [
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "expired",
        "acceptencoding",
        "html info",
        "title home",
        "tags viewport",
        "trackers google",
        "tag manager",
        "gsddf3d2bzf",
        "historical ssl",
        "referrer",
        "december",
        "formbook",
        "round",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "collection",
        "vt graph",
        "socgholish",
        "blister",
        "hacktool",
        "hiddentear",
        "gootloader",
        "agent tesla",
        "crypto",
        "installer",
        "life",
        "malware",
        "open",
        "korplug",
        "tofsee",
        "date",
        "name servers",
        "status",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "pulse submit",
        "url analysis",
        "files",
        "no data",
        "tag count",
        "analyzer threat",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "heur",
        "cisco umbrella",
        "alexa top",
        "million",
        "site",
        "alexa",
        "maltiverse",
        "xcnfe",
        "safe site",
        "phishing",
        "remcos",
        "malicious",
        "miner",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "trojan",
        "detplock",
        "artemis",
        "networm",
        "win64",
        "redline stealer",
        "limerat",
        "venom rat",
        "trojanspy",
        "tld count",
        "png image",
        "jpeg image",
        "rgba",
        "exif standard",
        "tiff image",
        "pattern match",
        "ascii text",
        "united",
        "jfif",
        "sha1",
        "core",
        "general",
        "starfield",
        "hybrid",
        "local",
        "encrypt",
        "click",
        "strings",
        "adobea",
        "daga",
        "as30148 sucuri",
        "td tr",
        "search",
        "span td",
        "as44273 host",
        "creation date",
        "a domains",
        "xtra",
        "meta",
        "back",
        "verdict",
        "domain",
        "aaaa",
        "as15169 google",
        "asnone united",
        "nxdomain",
        "sucuri security",
        "a li",
        "span",
        "class",
        "body",
        "sucuri website",
        "a div",
        "authority",
        "record value",
        "showing",
        "gmt content",
        "x sucuri",
        "high",
        "related pulses",
        "show",
        "guard",
        "entries",
        "win32",
        "west domains",
        "next",
        "ipv4",
        "asnone germany",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "formbook cnc",
        "checkin",
        "found",
        "error",
        "code",
        "create c",
        "read c",
        "delete",
        "write",
        "default",
        "dock",
        "execution",
        "copy",
        "xport",
        "firewall",
        "body doctype",
        "section",
        "dcrat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "url https",
        "blacklist",
        "cl0p ransomware",
        "zbot",
        "malware site",
        "team memscan",
        "cl0p",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus starizona",
        "cngo daddy",
        "g2 validity",
        "subject public",
        "key info",
        "certificate",
        "whois lookup",
        "netrange",
        "nethandle",
        "net192",
        "net1920000",
        "as174",
        "as3257",
        "sucuri",
        "sucur2",
        "verisign",
        "whois database",
        "server",
        "registrar abuse",
        "icann whois",
        "whois status",
        "registrar iana",
        "form",
        "temple",
        "first",
        "android",
        "win32 exe",
        "html",
        "bobby fischer",
        "office open",
        "detections type",
        "name",
        "pdf dealer",
        "price list",
        "pdf my",
        "crime",
        "taiwan unknown",
        "as3462",
        "as131148 bank",
        "as21342",
        "all search",
        "otx scoreblue",
        "pulse pulses",
        "cname",
        "as22612",
        "as43350 nforce",
        "win32upatre jun",
        "expiration date",
        "hostname",
        "lowfi",
        "date hash",
        "avast avg",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jun",
        "files show",
        "registrar",
        "china unknown",
        "title",
        "network",
        "fakedout threat",
        "urls http",
        "maltiverse safe",
        "malicious url",
        "team",
        "phishtank",
        "services",
        "botnet command",
        "control server",
        "mining",
        "betabot",
        "team malware",
        "engineering",
        "stealer",
        "service",
        "vawtrak",
        "virut",
        "emotet",
        "simda",
        "redline",
        "fri oct",
        "media sharing",
        "known infection source",
        "bot networks",
        "malware",
        "malware repository",
        "spyware"
      ],
      "references": [
        "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
        "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
        "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
        "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
        "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
        "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
        "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
        "IP\u2019s Contacted: 192.124.249.187",
        "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
        "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
        "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 94,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 4080,
        "URL": 11952,
        "hostname": 4638,
        "domain": 4301,
        "FileHash-MD5": 2236,
        "FileHash-SHA1": 1140,
        "CVE": 8,
        "SSLCertFingerprint": 20,
        "email": 8,
        "CIDR": 1
      },
      "indicator_count": 28384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "622 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6688e0ffb31d4881f3238713",
      "name": "Google Spy engine | Tracking, Malware Repository",
      "description": "www.W3.org https://www.searchw3.com/ >  ww.google.com.uy. All tags auto populated. Did not spend time documenting all as pulse is quite large. I was able to prove the the compromises are active. I will make much smaller reports.\n(Botnet Commands, Google Spy engine | Tracking, Malware Repository, Stealer, iPhone unlocker)",
      "modified": "2024-08-05T04:01:42.283000",
      "created": "2024-07-06T06:15:27.994000",
      "tags": [
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "expired",
        "acceptencoding",
        "html info",
        "title home",
        "tags viewport",
        "trackers google",
        "tag manager",
        "gsddf3d2bzf",
        "historical ssl",
        "referrer",
        "december",
        "formbook",
        "round",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "collection",
        "vt graph",
        "socgholish",
        "blister",
        "hacktool",
        "hiddentear",
        "gootloader",
        "agent tesla",
        "crypto",
        "installer",
        "life",
        "malware",
        "open",
        "korplug",
        "tofsee",
        "date",
        "name servers",
        "status",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "pulse submit",
        "url analysis",
        "files",
        "no data",
        "tag count",
        "analyzer threat",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "heur",
        "cisco umbrella",
        "alexa top",
        "million",
        "site",
        "alexa",
        "maltiverse",
        "xcnfe",
        "safe site",
        "phishing",
        "remcos",
        "malicious",
        "miner",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "trojan",
        "detplock",
        "artemis",
        "networm",
        "win64",
        "redline stealer",
        "limerat",
        "venom rat",
        "trojanspy",
        "tld count",
        "png image",
        "jpeg image",
        "rgba",
        "exif standard",
        "tiff image",
        "pattern match",
        "ascii text",
        "united",
        "jfif",
        "sha1",
        "core",
        "general",
        "starfield",
        "hybrid",
        "local",
        "encrypt",
        "click",
        "strings",
        "adobea",
        "daga",
        "as30148 sucuri",
        "td tr",
        "search",
        "span td",
        "as44273 host",
        "creation date",
        "a domains",
        "xtra",
        "meta",
        "back",
        "verdict",
        "domain",
        "aaaa",
        "as15169 google",
        "asnone united",
        "nxdomain",
        "sucuri security",
        "a li",
        "span",
        "class",
        "body",
        "sucuri website",
        "a div",
        "authority",
        "record value",
        "showing",
        "gmt content",
        "x sucuri",
        "high",
        "related pulses",
        "show",
        "guard",
        "entries",
        "win32",
        "west domains",
        "next",
        "ipv4",
        "asnone germany",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "formbook cnc",
        "checkin",
        "found",
        "error",
        "code",
        "create c",
        "read c",
        "delete",
        "write",
        "default",
        "dock",
        "execution",
        "copy",
        "xport",
        "firewall",
        "body doctype",
        "section",
        "dcrat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "url https",
        "blacklist",
        "cl0p ransomware",
        "zbot",
        "malware site",
        "team memscan",
        "cl0p",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus starizona",
        "cngo daddy",
        "g2 validity",
        "subject public",
        "key info",
        "certificate",
        "whois lookup",
        "netrange",
        "nethandle",
        "net192",
        "net1920000",
        "as174",
        "as3257",
        "sucuri",
        "sucur2",
        "verisign",
        "whois database",
        "server",
        "registrar abuse",
        "icann whois",
        "whois status",
        "registrar iana",
        "form",
        "temple",
        "first",
        "android",
        "win32 exe",
        "html",
        "bobby fischer",
        "office open",
        "detections type",
        "name",
        "pdf dealer",
        "price list",
        "pdf my",
        "crime",
        "taiwan unknown",
        "as3462",
        "as131148 bank",
        "as21342",
        "all search",
        "otx scoreblue",
        "pulse pulses",
        "cname",
        "as22612",
        "as43350 nforce",
        "win32upatre jun",
        "expiration date",
        "hostname",
        "lowfi",
        "date hash",
        "avast avg",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jun",
        "files show",
        "registrar",
        "china unknown",
        "title",
        "network",
        "fakedout threat",
        "urls http",
        "maltiverse safe",
        "malicious url",
        "team",
        "phishtank",
        "services",
        "botnet command",
        "control server",
        "mining",
        "betabot",
        "team malware",
        "engineering",
        "stealer",
        "service",
        "vawtrak",
        "virut",
        "emotet",
        "simda",
        "redline",
        "fri oct",
        "media sharing",
        "known infection source",
        "bot networks",
        "malware",
        "malware repository",
        "spyware"
      ],
      "references": [
        "https://www.searchw3.com/ = google.analytics.com, google.com, google.net, adservice.google.com.uy,https://plus.google.com/",
        "ns1.google.com, nussbaumlaw-ca.webpkgcache.com, plus.google.com, tddctx-com.webpkgcache.com,",
        "Ransomware: message.htm.com | nr-data.net [Apple Private Data Collection]",
        "https://otx.alienvault.com/indicator/file/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/e590f6ad5d0a831e297ed14c29af8467085d33bb26216501b621fbe8e8eca23b",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk uses_windows_utilities",
        "Alerts: cmdline_http_link clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint",
        "Alerts: anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self",
        "Alerts: stealth_window cmdline_http_link uses_windows_utilities suspicious_command_tools dead_connect",
        "IP\u2019s Contacted: 192.124.249.187",
        "Possible Fake AV Checkin Kazy/Kryptor/Cycbot Trojan Checkin BetterInstaller Win32.AdWare.iBryte.C Install Dooptroop CnC Beacon Win32/DownloadAssistant.A PUP CnC Win32.Sality-GR Checkin Win32/FlyStudio Activity W32/InstallRex.Adware Initial CnC Beacon PUP Win32/DownloadAssistant.A Checkin",
        "Alerts: ransomware_file_modifications script_created_process antivm_generic_bios antivm_generic_disk  antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "Alerts: enumerates_physical_drives clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile",
        "Alerts: clears_logs registry_credential_store_access infostealer_cookies recon_fingerprint suspicious_command_tools anomalous_deletefile antidebug_guardpages antisandbox_sleep dynamic_function_loading encrypted_ioc reads_self stealth_window cmdline_http_link uses_windows_utilities",
        "www.google.com/images/branding/googlelogo/1x/googlelogo, https://www.google.com/recaptcha/api.js?onload=recaptchaCallback&render=explicit&hl=",
        "www.google.com/images/branding/googlelogo/2x/googlelogo, www.google.com/images/errors/robot.png, www.google.com, www.google.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 89,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 4080,
        "URL": 11952,
        "hostname": 4638,
        "domain": 4301,
        "FileHash-MD5": 2236,
        "FileHash-SHA1": 1140,
        "CVE": 8,
        "SSLCertFingerprint": 20,
        "email": 8,
        "CIDR": 1
      },
      "indicator_count": 28384,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "622 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "quicktutorial.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "quicktutorial.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776639137.115133
}