{
  "type": "Domain",
  "indicator": "simplesports.us",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/simplesports.us",
    "alexa": "http://www.alexa.com/siteinfo/simplesports.us",
    "indicator": "simplesports.us",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3777732618,
      "indicator": "simplesports.us",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 14,
      "pulses": [
        {
          "id": "686d28ec9208b0424e0ccad2",
          "name": "Remote Keylogger | Foundry",
          "description": "Keylogger Remotely installed on all of targets devices. Up until\u2026 target had to purchase and return more than 50\ndevices minus service plans. Apple\nengineers have been involved many times. Mercenary attacks also confirmed: A kind phone store owner gave her a free phone that was hacked within seconds. \nUnless someone has been \u2018framing Palantir / Foundry Tech Mafia is portrayed a playing a  significant involvement of SA victim potentially since  day of coerced disclosure in 2013.\nThe first clue was a YouTube follower with a menacing name and picture began to follow, change login,  network, dumped adult content, utilized web content scrapers,. stole\nPasswords,etc., Anyway .. Unruy  & remotely installed keylogger. \n#foundry #apple #soc #keylogger \n\nThis is risky to say but very wrong to do. She was a multi generational (MGM) American.",
          "modified": "2025-09-19T03:02:22.742000",
          "created": "2025-07-08T14:19:24.211000",
          "tags": [
            "delete",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "delete c",
            "intel",
            "write",
            "malware",
            "dynamicloader",
            "yara rule",
            "high",
            "vmware",
            "phishing",
            "remote",
            "keylogger",
            "remote keylogger",
            "type indicator",
            "related pulses",
            "no expiration",
            "url https",
            "showing",
            "reputation",
            "foundry",
            "apple",
            "downloader",
            "trojan"
          ],
          "references": [
            "http://www.download-servers.com/SysInfo/Validate.exe||random.exe||/S||access your PC from anywhere!||Remote Access to your Home or Office PC remotely. Work on your PC from any internet computer or mobile. Access All files and transfer them between computers. Invite friends to view your LiveScreen and share presentations.||",
            "\u2022 engine.remote-keylogger.net \u2022 logout-superset2.remote-keylogger.net \u2022 mail.remote-keylogger.net",
            "\u2022 http://appleid.apple.com-cgi-bin-wets-myapleid.woa-wa-direct.yimucentral.com/apple/cgibin/confirm/processing/cmd=/95d9e0a26d38b5f248bb389e1a4d14c0/webobjects",
            "\u2022  199.59.243.226",
            "\u2022 ww25.vpn.steamcommunity-site.info",
            "\u2022 apple-mac.us \u2022 zpwi8.itunes-apple-jp.xyz \u2022 applefanatic.org \u2022 appleemailaccounts.com \u2022 http://appleemailaccounts.com/",
            "\u2022 zgcdfoundry.com \u2022 https://zgcdfoundry.com/",
            "\u2022 ww25.vpn.twitte5r.com | http://paypal-online.5flix.net/ | court-supreme.us",
            "\u2022 https://animal64u.com/bestiality-animal-porn/dog \u2022 \thttp://xxnxporntube.com",
            "\u2022 starbucksmobilepay.5flix.net | https://mobilemobster.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Reputation.1",
              "display_name": "Reputation.1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [
            "Telecommunications",
            "Technology",
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 260,
            "FileHash-SHA1": 244,
            "FileHash-SHA256": 4406,
            "URL": 9684,
            "domain": 3164,
            "hostname": 3370,
            "CVE": 1
          },
          "indicator_count": 21129,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "214 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "663b4a3d4df0c7f120a8c60c",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE [02/27/2024]",
          "description": "",
          "modified": "2024-05-08T09:47:41.535000",
          "created": "2024-05-08T09:47:41.535000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "65de914a22e80e90ac329dce",
          "export_count": 1176,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "712 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d97b3040e853a998bbd2cf",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "GandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-24T05:14:24.088000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [suffered a medium risk GandCrab ransomware attack] I guess they don't know.",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable",
            "identity_helper.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 73470000"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d97b3131bb8503e087d749",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "GandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-24T05:14:25.808000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [suffered a medium risk GandCrab ransomware attack] I guess they don't know.",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable",
            "identity_helper.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 73470000"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d97d89cda3f0dbf62f499d",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "*Edit: I meant to mean at&t may be unaware despite reported outage. My AT&T study is private and researched from corporate device. \n\nGandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-24T05:24:25.169000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d97d8e925459e97ca124c9",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "*Edit: I meant to mean at&t may be unaware despite reported outage. My AT&T study is private and researched from corporate device. \n\nGandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-24T05:24:30.672000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65da19c17ee182a7fb5122a0",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-24T16:30:57.575000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "65d97d8e925459e97ca124c9",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65dc53a7d5ebf2b12d2e4bf1",
          "name": "test",
          "description": "",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-26T09:02:31.405000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "65da19c17ee182a7fb5122a0",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "drissm69",
            "id": "272382",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 2,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65de914a22e80e90ac329dce",
          "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
          "description": "",
          "modified": "2024-03-25T03:03:48.639000",
          "created": "2024-02-28T01:50:02.478000",
          "tags": [
            "contacted",
            "t whois",
            "switch dns",
            "password",
            "adware",
            "trojan",
            "worm",
            "dns",
            "tracking",
            "ransomware",
            "as8075",
            "united",
            "unknown",
            "creation date",
            "search",
            "date",
            "entries",
            "pulse pulses",
            "passive dns",
            "urls",
            "defense",
            "date hash",
            "showing",
            "greatcall",
            "lively",
            "cname",
            "path",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "expiressat",
            "maxage31536000",
            "html info",
            "title access",
            "denied trackers",
            "bing ads",
            "ver2",
            "vids1",
            "msclkidn",
            "home pg",
            "utc google",
            "tag manager",
            "ssl certificate",
            "whois record",
            "referrer",
            "communicating",
            "whois whois",
            "historical ssl",
            "resolutions",
            "pe resource",
            "ip addresses",
            "execution",
            "malware",
            "urls url",
            "domains domain",
            "threat roundup",
            "cyber crime",
            "use collection",
            "files",
            "parent domain",
            "network",
            "december",
            "august",
            "round",
            "february",
            "june",
            "cobalt strike",
            "lockbit",
            "miner",
            "ransom",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "av detections",
            "ids detections",
            "copy",
            "conhost",
            "shell commands",
            "processes tree",
            "samplepath",
            "dynamicloader",
            "domain",
            "query",
            "etpro malware",
            "gandcrab dns",
            "lookup",
            "powershell",
            "write",
            "gandcrab",
            "as14061",
            "a domains",
            "meta",
            "type",
            "moved",
            "body",
            "encrypt",
            "germany unknown",
            "as3209 vodafone",
            "aaaa",
            "next",
            "error",
            "status",
            "as797 att",
            "copyright c",
            "record value",
            "expiration date",
            "name servers",
            "serving ip",
            "address",
            "date sat",
            "gmt contenttype",
            "win32 exe",
            "detections type",
            "name",
            "android",
            "decode",
            "crypt",
            "contacted urls",
            "relacionada",
            "agent tesla",
            "active threats",
            "spyware",
            "cyberstalking",
            "as54113",
            "as22075",
            "japan",
            "germany",
            "united kingdom",
            "australia",
            "as13789",
            "apple ios",
            "tsara brashears",
            "unlocker",
            "apple",
            "password",
            "apple private",
            "data collection",
            "cyber warfare",
            "core",
            "hacktool",
            "malicious",
            "banker",
            "keylogger",
            "bot networks",
            "elderly",
            "disability",
            "health phone",
            "brashears",
            "tsara",
            "brian",
            "m",
            "sabey",
            "tulach",
            "rsa sha256",
            "content type",
            "access",
            "length",
            "masquerade",
            "true defense",
            "fraud services"
          ],
          "references": [
            "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
            "192.168.0.25 [Network Router Admin Login to wireless routers]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
            "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
            "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
            "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
            "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
            "images.ctfassets.net [data collection of citizen]",
            "114.114.114.114 - Tulach Malware",
            "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
            "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
            "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
            "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
            "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
            "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
            "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
            "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
            "ttp://nomoreransom.coin/ [method \u2022 user agent]",
            "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
            "Cobalt Strike | 3.12.49.0 | Amazon 02",
            "uversecentral3.att.com [decode cookie \u2022 unlock]",
            "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
            "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/GandCrab.AE",
              "display_name": "Ransom:Win32/GandCrab.AE",
              "target": "/malware/Ransom:Win32/GandCrab.AE"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Ransom:Win32/GandCrab.E",
              "display_name": "Ransom:Win32/GandCrab.E",
              "target": "/malware/Ransom:Win32/GandCrab.E"
            },
            {
              "id": "Win.Packer.Crypter-6539596-1",
              "display_name": "Win.Packer.Crypter-6539596-1",
              "target": null
            },
            {
              "id": "ETPro",
              "display_name": "ETPro",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "ALF:TrojanSpy:Win32/Keylogger",
              "display_name": "ALF:TrojanSpy:Win32/Keylogger",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1183",
              "name": "Image File Execution Options Injection",
              "display_name": "T1183 - Image File Execution Options Injection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "65d97d89cda3f0dbf62f499d",
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 231,
            "FileHash-SHA1": 217,
            "FileHash-SHA256": 1628,
            "URL": 298,
            "domain": 1047,
            "hostname": 877,
            "email": 7
          },
          "indicator_count": 4305,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "757 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136b5eb9bdd21070ff9d7",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:41.263000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 70,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c1ac991f85328604d2",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:52.382000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c8e530066ae793dc64",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:18:00.623000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65413ea960cc79abf6d446fb",
          "name": "Vawtrak credential stealer | CNC",
          "description": "Cyber warfare\nTracking\nMonitoring\nMalvertizing\nCNC\nKeylogging\nBotNet\nSever Privacy Invasion",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:51:37.016000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 74,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545be6e02e0f9f82cb1febf",
          "name": "Vawtrak credential stealer | CNC",
          "description": "",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-11-04T03:45:50.234000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65413ea960cc79abf6d446fb",
          "export_count": 86,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "identity_helper.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 73470000",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "\u2022 engine.remote-keylogger.net \u2022 logout-superset2.remote-keylogger.net \u2022 mail.remote-keylogger.net",
        "\u2022  199.59.243.226",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "images.ctfassets.net [data collection of citizen]",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "\u2022 ww25.vpn.steamcommunity-site.info",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "http://www.download-servers.com/SysInfo/Validate.exe||random.exe||/S||access your PC from anywhere!||Remote Access to your Home or Office PC remotely. Work on your PC from any internet computer or mobile. Access All files and transfer them between computers. Invite friends to view your LiveScreen and share presentations.||",
        "\u2022 apple-mac.us \u2022 zpwi8.itunes-apple-jp.xyz \u2022 applefanatic.org \u2022 appleemailaccounts.com \u2022 http://appleemailaccounts.com/",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable",
        "\u2022 https://animal64u.com/bestiality-animal-porn/dog \u2022 \thttp://xxnxporntube.com",
        "https://www.att.com/ [suffered a medium risk GandCrab ransomware attack] I guess they don't know.",
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "\u2022 zgcdfoundry.com \u2022 https://zgcdfoundry.com/",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "\u2022 starbucksmobilepay.5flix.net | https://mobilemobster.com/",
        "114.114.114.114 - Tulach Malware",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "\u2022 http://appleid.apple.com-cgi-bin-wets-myapleid.woa-wa-direct.yimucentral.com/apple/cgibin/confirm/processing/cmd=/95d9e0a26d38b5f248bb389e1a4d14c0/webobjects",
        "\u2022 ww25.vpn.twitte5r.com | http://paypal-online.5flix.net/ | court-supreme.us"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Reputation.1",
            "Tulach malware",
            "Unruy",
            "Ransom:win32/gandcrab.e",
            "Etpro",
            "Win32:ransomx-gen\\ [ransom]",
            "Alf:trojanspy:win32/keylogger",
            "Ransom:win32/gandcrab.ae",
            "Crypt3.blxp",
            "Win.packer.crypter-6539596-1",
            "Cobalt strike"
          ],
          "industries": [
            "Telecommunications",
            "Media",
            "Defense",
            "Government",
            "Civil society",
            "Technology"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 14,
  "pulses": [
    {
      "id": "686d28ec9208b0424e0ccad2",
      "name": "Remote Keylogger | Foundry",
      "description": "Keylogger Remotely installed on all of targets devices. Up until\u2026 target had to purchase and return more than 50\ndevices minus service plans. Apple\nengineers have been involved many times. Mercenary attacks also confirmed: A kind phone store owner gave her a free phone that was hacked within seconds. \nUnless someone has been \u2018framing Palantir / Foundry Tech Mafia is portrayed a playing a  significant involvement of SA victim potentially since  day of coerced disclosure in 2013.\nThe first clue was a YouTube follower with a menacing name and picture began to follow, change login,  network, dumped adult content, utilized web content scrapers,. stole\nPasswords,etc., Anyway .. Unruy  & remotely installed keylogger. \n#foundry #apple #soc #keylogger \n\nThis is risky to say but very wrong to do. She was a multi generational (MGM) American.",
      "modified": "2025-09-19T03:02:22.742000",
      "created": "2025-07-08T14:19:24.211000",
      "tags": [
        "delete",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "delete c",
        "intel",
        "write",
        "malware",
        "dynamicloader",
        "yara rule",
        "high",
        "vmware",
        "phishing",
        "remote",
        "keylogger",
        "remote keylogger",
        "type indicator",
        "related pulses",
        "no expiration",
        "url https",
        "showing",
        "reputation",
        "foundry",
        "apple",
        "downloader",
        "trojan"
      ],
      "references": [
        "http://www.download-servers.com/SysInfo/Validate.exe||random.exe||/S||access your PC from anywhere!||Remote Access to your Home or Office PC remotely. Work on your PC from any internet computer or mobile. Access All files and transfer them between computers. Invite friends to view your LiveScreen and share presentations.||",
        "\u2022 engine.remote-keylogger.net \u2022 logout-superset2.remote-keylogger.net \u2022 mail.remote-keylogger.net",
        "\u2022 http://appleid.apple.com-cgi-bin-wets-myapleid.woa-wa-direct.yimucentral.com/apple/cgibin/confirm/processing/cmd=/95d9e0a26d38b5f248bb389e1a4d14c0/webobjects",
        "\u2022  199.59.243.226",
        "\u2022 ww25.vpn.steamcommunity-site.info",
        "\u2022 apple-mac.us \u2022 zpwi8.itunes-apple-jp.xyz \u2022 applefanatic.org \u2022 appleemailaccounts.com \u2022 http://appleemailaccounts.com/",
        "\u2022 zgcdfoundry.com \u2022 https://zgcdfoundry.com/",
        "\u2022 ww25.vpn.twitte5r.com | http://paypal-online.5flix.net/ | court-supreme.us",
        "\u2022 https://animal64u.com/bestiality-animal-porn/dog \u2022 \thttp://xxnxporntube.com",
        "\u2022 starbucksmobilepay.5flix.net | https://mobilemobster.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "Reputation.1",
          "display_name": "Reputation.1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        }
      ],
      "industries": [
        "Telecommunications",
        "Technology",
        "Media"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 260,
        "FileHash-SHA1": 244,
        "FileHash-SHA256": 4406,
        "URL": 9684,
        "domain": 3164,
        "hostname": 3370,
        "CVE": 1
      },
      "indicator_count": 21129,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 144,
      "modified_text": "214 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "663b4a3d4df0c7f120a8c60c",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE [02/27/2024]",
      "description": "",
      "modified": "2024-05-08T09:47:41.535000",
      "created": "2024-05-08T09:47:41.535000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": "65de914a22e80e90ac329dce",
      "export_count": 1176,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 3,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "712 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d97b3040e853a998bbd2cf",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "GandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-24T05:14:24.088000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [suffered a medium risk GandCrab ransomware attack] I guess they don't know.",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable",
        "identity_helper.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 73470000"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d97b3131bb8503e087d749",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "GandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-24T05:14:25.808000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [suffered a medium risk GandCrab ransomware attack] I guess they don't know.",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable",
        "identity_helper.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 73470000"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d97d89cda3f0dbf62f499d",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "*Edit: I meant to mean at&t may be unaware despite reported outage. My AT&T study is private and researched from corporate device. \n\nGandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-24T05:24:25.169000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d97d8e925459e97ca124c9",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "*Edit: I meant to mean at&t may be unaware despite reported outage. My AT&T study is private and researched from corporate device. \n\nGandCrab : GandCrab was a Ransomware-as-a-Service (RaaS). GandCrab Ransomware is a ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.In many instances, files are encrypted to control, spy, monitor dns traffic, download other malware, spy on targets, modify, delete, write on victims devices going undetected.",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-24T05:24:30.672000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65da19c17ee182a7fb5122a0",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-24T16:30:57.575000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": "65d97d8e925459e97ca124c9",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65dc53a7d5ebf2b12d2e4bf1",
      "name": "test",
      "description": "",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-26T09:02:31.405000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": "65da19c17ee182a7fb5122a0",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "drissm69",
        "id": "272382",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 2,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65de914a22e80e90ac329dce",
      "name": "AT&T \u2022 Ransom:Win32/GandCrab.AE",
      "description": "",
      "modified": "2024-03-25T03:03:48.639000",
      "created": "2024-02-28T01:50:02.478000",
      "tags": [
        "contacted",
        "t whois",
        "switch dns",
        "password",
        "adware",
        "trojan",
        "worm",
        "dns",
        "tracking",
        "ransomware",
        "as8075",
        "united",
        "unknown",
        "creation date",
        "search",
        "date",
        "entries",
        "pulse pulses",
        "passive dns",
        "urls",
        "defense",
        "date hash",
        "showing",
        "greatcall",
        "lively",
        "cname",
        "path",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "expiressat",
        "maxage31536000",
        "html info",
        "title access",
        "denied trackers",
        "bing ads",
        "ver2",
        "vids1",
        "msclkidn",
        "home pg",
        "utc google",
        "tag manager",
        "ssl certificate",
        "whois record",
        "referrer",
        "communicating",
        "whois whois",
        "historical ssl",
        "resolutions",
        "pe resource",
        "ip addresses",
        "execution",
        "malware",
        "urls url",
        "domains domain",
        "threat roundup",
        "cyber crime",
        "use collection",
        "files",
        "parent domain",
        "network",
        "december",
        "august",
        "round",
        "february",
        "june",
        "cobalt strike",
        "lockbit",
        "miner",
        "ransom",
        "show",
        "scan endpoints",
        "all octoseek",
        "filehash",
        "av detections",
        "ids detections",
        "copy",
        "conhost",
        "shell commands",
        "processes tree",
        "samplepath",
        "dynamicloader",
        "domain",
        "query",
        "etpro malware",
        "gandcrab dns",
        "lookup",
        "powershell",
        "write",
        "gandcrab",
        "as14061",
        "a domains",
        "meta",
        "type",
        "moved",
        "body",
        "encrypt",
        "germany unknown",
        "as3209 vodafone",
        "aaaa",
        "next",
        "error",
        "status",
        "as797 att",
        "copyright c",
        "record value",
        "expiration date",
        "name servers",
        "serving ip",
        "address",
        "date sat",
        "gmt contenttype",
        "win32 exe",
        "detections type",
        "name",
        "android",
        "decode",
        "crypt",
        "contacted urls",
        "relacionada",
        "agent tesla",
        "active threats",
        "spyware",
        "cyberstalking",
        "as54113",
        "as22075",
        "japan",
        "germany",
        "united kingdom",
        "australia",
        "as13789",
        "apple ios",
        "tsara brashears",
        "unlocker",
        "apple",
        "password",
        "apple private",
        "data collection",
        "cyber warfare",
        "core",
        "hacktool",
        "malicious",
        "banker",
        "keylogger",
        "bot networks",
        "elderly",
        "disability",
        "health phone",
        "brashears",
        "tsara",
        "brian",
        "m",
        "sabey",
        "tulach",
        "rsa sha256",
        "content type",
        "access",
        "length",
        "masquerade",
        "true defense",
        "fraud services"
      ],
      "references": [
        "https://www.att.com/ [has a medium risk GandCrab ransomware attack]",
        "192.168.0.25 [Network Router Admin Login to wireless routers]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 service modification \u2022 data collection of private citizen]",
        "m.greatcall.com - Lively phone user/ [fraud/modified services/ spyware \u2022 listens to call or activities of affected]",
        "http://m.greatcall.com/android/link/1.9/metadata/images/720x1280/resources.json [ spyware \u2022 agent may view, modify, add or delete device images]",
        "https://www.greatcall.com/MemberSection/mobileapps/fivestarlandingpage [spyware \u2022 members can hear phone calls and personal conversations & behavior of affected]",
        "facebooksunglassshop.com - Pegasus type tool [spyware data collection]",
        "images.ctfassets.net [data collection of citizen]",
        "114.114.114.114 - Tulach Malware",
        "CS Yara Rules: SUSP_RANSOMWARE_Indicator_Jul20 from ruleset crime_ransom_generic by Florian Roth (Nextron Systems)",
        "CS Yara Rules: Gandcrab from ruleset Gandcrab by kevoreilly",
        "inbound.mail.truedefense.com = Hacker. Receives inbound mail if target/targets",
        "https://www.pornhub.com/video/search?search=tsara+brashears [API \u2022 iOS password decryption]",
        "Unauthorized modification of a 'Lively' Jitterbug Phone to Verizon service",
        "https://bat.bing.com/action/0?ti=18003891&Ver=2&mid=d698ee97-c6e1-4285-a48a-9d8a49e51f5d&sid=426b3c30cca411ee907ded2ff69dbac6&vid=4",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 [spyware \u2022data collection through media \u2022 similar to Pegasus behavior]",
        "http://www.robinsoftware.com/youtube-video-downloader/update.xml [malicious software \u2022 pornhub downloader]",
        "https://otx.alienvault.com/indicator/file/00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32 [gandcrab .bit \u2022 DNS check \u2022 loader]",
        "ttp://nomoreransom.coin/ [method \u2022 user agent]",
        "tox.chat [moved \u2022 nginx \u2022 instant messaging platform]",
        "Cobalt Strike | 3.12.49.0 | Amazon 02",
        "uversecentral3.att.com [decode cookie \u2022 unlock]",
        "http://xred.site50.net/syn/Synaptics.rar [ malicious \u2022 spyware and malware]",
        "Mitre Capabilities: Host-Interaction \u2022 Data-Manipulation \u2022 Anti-Analysis Linking \u2022 Load-Code Executable"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/GandCrab.AE",
          "display_name": "Ransom:Win32/GandCrab.AE",
          "target": "/malware/Ransom:Win32/GandCrab.AE"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Ransom:Win32/GandCrab.E",
          "display_name": "Ransom:Win32/GandCrab.E",
          "target": "/malware/Ransom:Win32/GandCrab.E"
        },
        {
          "id": "Win.Packer.Crypter-6539596-1",
          "display_name": "Win.Packer.Crypter-6539596-1",
          "target": null
        },
        {
          "id": "ETPro",
          "display_name": "ETPro",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "ALF:TrojanSpy:Win32/Keylogger",
          "display_name": "ALF:TrojanSpy:Win32/Keylogger",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1183",
          "name": "Image File Execution Options Injection",
          "display_name": "T1183 - Image File Execution Options Injection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": "65d97d89cda3f0dbf62f499d",
      "export_count": 42,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 231,
        "FileHash-SHA1": 217,
        "FileHash-SHA256": 1628,
        "URL": 298,
        "domain": 1047,
        "hostname": 877,
        "email": 7
      },
      "indicator_count": 4305,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "757 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654136b5eb9bdd21070ff9d7",
      "name": "Cyber Espionage",
      "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
      "modified": "2023-11-30T07:01:37.424000",
      "created": "2023-10-31T17:17:41.263000",
      "tags": [
        "contacted",
        "resolutions",
        "origin1",
        "ip address",
        "list",
        "communicating",
        "cyber threat",
        "united",
        "phishing",
        "phishing site",
        "covid19",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "installcore",
        "nymaim",
        "suppobox",
        "malicious",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "malware",
        "malware site",
        "malicious site",
        "heur",
        "exploit",
        "alexa",
        "riskware",
        "team",
        "blacklist https",
        "blacklist",
        "facebook",
        "engineering",
        "iframe",
        "downloader",
        "unsafe",
        "artemis",
        "trojanx",
        "agent",
        "unruy",
        "win64",
        "fakealert",
        "fusioncore",
        "redirector",
        "killav",
        "trojan",
        "lokibot",
        "emotet",
        "redline stealer",
        "cobalt strike",
        "citadel",
        "vawtrak",
        "qakbot",
        "qbot",
        "bankerx",
        "dropper",
        "nimda",
        "formbook",
        "swrort",
        "adwind",
        "crack",
        "generic",
        "wacatac",
        "opencandy",
        "nircmd",
        "downldr",
        "filetour",
        "cleaner",
        "conduit",
        "tiggre",
        "presenoker",
        "zpevdo",
        "webcompanion",
        "seraph",
        "tofsee",
        "xrat",
        "xtrat",
        "patcher",
        "adload",
        "stealer",
        "vidar",
        "raccoon",
        "bank",
        "urls",
        "generic malware",
        "noname057",
        "reimer",
        "agency",
        "charles",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "name verdict",
        "date",
        "root ca",
        "markmonitor",
        "name server",
        "windir",
        "unknown",
        "swisscom root",
        "post root",
        "trust",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "defence",
        "fraud",
        "logistics",
        "ipv4",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "report spam",
        "author",
        "cyber warfare",
        "created",
        "months ago",
        "modified",
        "next",
        "url https",
        "url http",
        "all octoseek",
        "month ago",
        "utmsourcemailer",
        "ck id",
        "t1140",
        "filehashsha256",
        "tsara brashears",
        "adult content",
        "pornography",
        "malvertizing",
        "privacy invasion",
        "privilege escalation",
        "packed",
        "aig.com",
        "aig.rastreator.mx",
        "apple",
        "ios",
        "tracking",
        "monitoring",
        "nr-data.net",
        "asp.net"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        }
      ],
      "industries": [
        "Defense",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 70,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 166,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 5806,
        "URL": 16475,
        "domain": 3302,
        "hostname": 5135,
        "CVE": 16,
        "email": 8
      },
      "indicator_count": 31033,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "872 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "simplesports.us",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "simplesports.us",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776745468.6867316
}