{
  "type": "Domain",
  "indicator": "stackstorage.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/stackstorage.com",
    "alexa": "http://www.alexa.com/siteinfo/stackstorage.com",
    "indicator": "stackstorage.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3731201322,
      "indicator": "stackstorage.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 15,
      "pulses": [
        {
          "id": "69a02837827feb0b78fa3ad2",
          "name": "The Belasco Chain",
          "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
          "modified": "2026-04-19T09:34:35.173000",
          "created": "2026-02-26T11:02:15.932000",
          "tags": [
            "file size",
            "mwdb",
            "bazaar",
            "sha3384",
            "ssdeep",
            "file type",
            "sha1",
            "sha256",
            "crc32",
            "filenames c"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2805,
            "FileHash-SHA1": 2568,
            "FileHash-SHA256": 7488,
            "domain": 1883,
            "hostname": 1466,
            "URL": 1179,
            "email": 46,
            "CVE": 46,
            "CIDR": 3,
            "YARA": 7,
            "IPv4": 94,
            "JA3": 1
          },
          "indicator_count": 17586,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 53,
          "modified_text": "11 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a552fd9d101a62085afa08",
          "name": "48f3d614d7a5bb1d98de0387af6f48fb8d08f892982821bbe9fd7dc867185454",
          "description": "More to come. #acoupleofbadapples",
          "modified": "2026-04-01T09:17:38.908000",
          "created": "2026-03-02T09:06:05.279000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 39,
            "FileHash-SHA1": 45,
            "FileHash-SHA256": 202,
            "CIDR": 2,
            "URL": 24,
            "domain": 121,
            "hostname": 23,
            "email": 6
          },
          "indicator_count": 462,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a1702ccff0b6afd6c01180",
          "name": "Strategic Intel Brief: The \"Shadow Corridor\" Persistence",
          "description": "The forensic convergence of the September 26, 2025, shadow renewal and the May 2, 2025, certificate issuance (925a10) confirms a high-fidelity infrastructure alignment targeting the Port of Portland\u2019s aviation assets. By embedding an unauthorized clientAuth extension within a legitimate Amazon RSA signature, the adversary bridged the gap between web traffic and hardware-level telematics, facilitating a sophisticated identity packaging campaign. This operation leveraged the 159,942 Majestic Trust Rank to validate a Serial 1 SOA shadow zone, utilizing ASP.NET Core request smuggling via the 13.32.205.51 node to maintain a low-noise presence across the PDX-HIO-TTD corridor. This alignment is evidenced by the 60-second TTL rotation of 3.169.202.x collection nodes, while the Network Solutions registrant shift to the hex-encoded 3432650ec... ID provides the final administrative anchor for the 2031 lease.",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-02-27T10:21:32.721000",
          "tags": [
            "a div",
            "div div",
            "click",
            "span",
            "class",
            "travelers span",
            "div language",
            "cultureen",
            "english",
            "culturees",
            "title",
            "main"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 15,
            "FileHash-SHA1": 20,
            "URL": 225,
            "domain": 375,
            "hostname": 315,
            "email": 20,
            "FileHash-SHA256": 122,
            "CVE": 18
          },
          "indicator_count": 1110,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf6063da146ed025a8890f",
          "name": "Double Umbrella Wixc2 Followup Iocs",
          "description": "The full text of the report on GoDaddy.com, which was published on 1 January 2017, is published online by the Internet Service Authority (icann) and will not be displayed on its website.>>><<<< pretext i didnt write - refer to my double umbrella post for big IP data",
          "modified": "2026-03-22T04:18:56.895000",
          "created": "2026-03-22T03:22:11.640000",
          "tags": [
            "script urls",
            "present jun",
            "present jul",
            "a domains",
            "status",
            "present aug",
            "date",
            "united",
            "present feb",
            "meta",
            "title",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 298,
            "FileHash-SHA1": 280,
            "FileHash-SHA256": 336,
            "IPv4": 31,
            "URL": 327,
            "domain": 548,
            "email": 8,
            "hostname": 136
          },
          "indicator_count": 1964,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "28 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf65566ad1032d77814945",
          "name": "Double Umbrella Wixc2 Followup Iocs [cloned pulse by msudosos]",
          "description": "",
          "modified": "2026-03-22T03:43:18.431000",
          "created": "2026-03-22T03:43:18.431000",
          "tags": [
            "script urls",
            "present jun",
            "present jul",
            "a domains",
            "status",
            "present aug",
            "date",
            "united",
            "present feb",
            "meta",
            "title",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69bf6063da146ed025a8890f",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 148,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 186,
            "IPv4": 31,
            "URL": 324,
            "domain": 545,
            "email": 8,
            "hostname": 136
          },
          "indicator_count": 1508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "28 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ad46275b8f0f4e3ffaff34",
          "name": "autofill.google.apis.com",
          "description": "",
          "modified": "2026-03-08T10:25:11.943000",
          "created": "2026-03-08T09:49:27.962000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 321,
            "domain": 104,
            "email": 2,
            "URL": 1
          },
          "indicator_count": 428,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "42 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6958372ef9da31513d96bebb",
          "name": "Connected-IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation",
          "description": "Retaliation? IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation for malicious control | found in the analytics of a highly target device: I\u2019ve included related pulses from 2 other threat responders and an Apple discussion post. Surprisingly, most of the IoC\u2019s pulsed came from one page of analytics. | \u2022 \"avconferenced\", \"procPath\" : \"\\/usr\\/libexec\\/avconferenced |  180.4.1.2 | a version of\npegasus found. | https://prometheus-pushgateway-internal.preview.tp-staging.com/\t\nhostname: prometheus.netmaker.vonnue.dev\t\nhostname: prometheus.dev.aws.finoa.io |\nSince Prometheus pulse . I realize now every Prometheus pulse illicits outrageous behavior.. Is this a secret society? Try to be more secretive. Owl heads in lawn. This behavior illicits investigation for a fix. Please STOP. I\u2019m done looking at Prometheus. Please stop leaving artifacts.",
          "modified": "2026-02-01T20:00:08.812000",
          "created": "2026-01-02T21:22:54.247000",
          "tags": [
            "syscall",
            "nsrunloop",
            "objcclass",
            "region type",
            "start",
            "vsize",
            "prtmax shrmod",
            "region detailn",
            "unused space",
            "at startn",
            "guard",
            "urls",
            "url analysis",
            "verdict",
            "domain",
            "address",
            "location japan",
            "hikone",
            "japan asn",
            "as4713 ntt",
            "related tags",
            "none external",
            "aaaa",
            "united",
            "passive dns",
            "ip address",
            "japan",
            "present dec",
            "domain add",
            "files",
            "japan unknown",
            "present jul",
            "present oct",
            "present sep",
            "present aug",
            "present jun",
            "japan showing",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "reverse dns",
            "present nov",
            "present",
            "present may",
            "present mar",
            "present apr",
            "data upload",
            "extraction",
            "failed",
            "files ip",
            "moved",
            "gmt content",
            "ipv4 add",
            "location united",
            "title",
            "ipv4",
            "dns resolutions",
            "hostname add",
            "asn as4713",
            "all ipv4",
            "google",
            "ocn ntt",
            "googlecl",
            "http",
            "amazon02",
            "akamaias",
            "page url",
            "yahoojp",
            "december",
            "jp summary",
            "february",
            "asn15169",
            "tokyo",
            "kansas city",
            "asn396982",
            "asn30286",
            "asn16509",
            "cisco",
            "umbrella rank",
            "cisco umbrella",
            "rank",
            "kitashinagawa",
            "sureserver ev",
            "ca g3",
            "domains",
            "hashes",
            "microsoft",
            "docomo business",
            "ml14325",
            "as autonomous",
            "asn8075",
            "ip information",
            "ipasns ip",
            "detail domain",
            "domain tree",
            "links domain",
            "requested",
            "value",
            "automatic",
            "webgl",
            "please",
            "mr value",
            "muid value",
            "mjl function",
            "dcmlinker",
            "paq string",
            "kb script",
            "b image",
            "b script",
            "frame a344",
            "redirect chain",
            "kb document",
            "frame",
            "b xhr",
            "kb image",
            "fetch collect",
            "request chain",
            "redirected",
            "http redirect",
            "name servers",
            "redacted for",
            "servers",
            "unknown aaaa",
            "search",
            "for privacy",
            "domeny serwery",
            "verdana tahoma",
            "arial",
            "gmt contenttype",
            "meta",
            "small",
            "results jan",
            "present jan",
            "status",
            "record value",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "process details",
            "flag",
            "japan japan",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "null",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "defense evasion",
            "monitored target",
            "pulse submit",
            "wikipedia",
            "imap",
            "smtp",
            "ocn open",
            "discussion",
            "stub",
            "jprs database",
            "ocnnttocn",
            "maintenance",
            "outages notice",
            "lock status",
            "state",
            "connected",
            "organization",
            "type",
            "name",
            "server",
            "name server",
            "connected date",
            "algorithm",
            "key identifier",
            "data",
            "v3 serial",
            "number",
            "cjp ocybertrust",
            "ev ca",
            "g3 validity",
            "ku ontt",
            "docomo",
            "record type",
            "ttl value",
            "thumbprint",
            "emails",
            "date",
            "trojan",
            "pegasus",
            "title error",
            "hostname",
            "pulse pulses",
            "entries",
            "mtb apr",
            "lowfi",
            "win32",
            "a domains",
            "body",
            "worm",
            "virtool",
            "cybota",
            "showing",
            "palantir",
            "prometheus"
          ],
          "references": [
            "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
            "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
            "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
            "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
            "Nippon Telegraph and Telephone Corporation one governmental now privated",
            "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
            "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
            "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
            "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
            "https://discussions.apple.com/thread/255214328?sortBy=rank",
            "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
            "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
            "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
            "swarm-foundry.com",
            "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
            "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
            "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
            "server-3-164-143-102.nrt20.r.cloudfront.net",
            "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
            "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
            "https://ww41.porn25.com/",
            "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
            "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
            "Other constitutional rights and privileges written in law where severe courses of action is allowed",
            "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
            "Device targeted with l RMS Modules by male in Denver, Co",
            "Attempts to clip target at high rate of speed.Seen again at her residence in October",
            "Target was monitored in store and followed home needed to stop multiple times , change routes.",
            "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
            "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
            "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
            "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
            "Malicious activity seen since a Pulse regarding school outage.",
            "Location search was used to find device users address. It\u2019s with me.",
            "Delete service is being used on this Threat service",
            "Many indicators point to an IP this block is on.",
            "It\u2019s so out of hand,m for 16 people.",
            "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
            "prometheus.netmaker.vonnue.dev",
            "prometheus.dev.aws.finoa.io",
            "Prometheus - Alien God? Morality through the eyes of the immoral",
            "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2879,
            "domain": 1372,
            "URL": 5788,
            "FileHash-SHA256": 1720,
            "CVE": 1,
            "FileHash-MD5": 238,
            "FileHash-SHA1": 241,
            "email": 13
          },
          "indicator_count": 12252,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "77 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e87da28b9c1611223c1a6b",
          "name": "Telegram - Remote install | log4shell-generic | Botnet | Pegasus Relationship",
          "description": "0.0.0.0 Day: Exploiting Localhost APIs From the Browser.\nA root of device issues: \nTarget was remotely subscribed to Telegram 10/23. This phone silently made 2 calls to (380) 222-3333. An activation code for blacklisted t.me/login/***** received by text. Target remembers this occured during sleep. Pegasus relationship. Mirai relationship auto-populated. Reference to new  Mirai infection. I didn't find  Mirai IoC's\nBrian Hau? Lol, idk about that.\n|| SLFPER:SoftwareBundler:Win32/Dlhelper\n#Lowfi:LUA:AutoItV3CraftedOverlay\nALF:HeraklezEval:Trojan:Win32/Ymacco\nBackdoor:Win32/Tofsee\nMirai\nTEL:Exploit:O97M/CVE-2017-8570\nTofsee\nTrojan:Win32/Glupteba\nTrojan:Win32/Kryptik\nTrojan:Win32/Mydoom\nWin.Packed.Enigma-10023199-0\nWin.Packer.pkr_ce1a-9980177-0\nWin32:PWSX-gen\\ [Trj]",
          "modified": "2024-10-16T15:00:45.833000",
          "created": "2024-09-16T18:49:06.831000",
          "tags": [
            "dynamicloader",
            "high",
            "windows",
            "medium",
            "grum",
            "yara detections",
            "contacted",
            "installs",
            "windows startup",
            "application",
            "tofsee",
            "stream",
            "less see",
            "copy",
            "aaaa",
            "virgin islands",
            "whitelisted",
            "antigua",
            "org domains",
            "proxy",
            "code",
            "search",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "formbook cnc",
            "checkin",
            "entries",
            "body",
            "possible",
            "mozilla",
            "delete c",
            "windows nt",
            "show",
            "owotrus ca",
            "limited",
            "cnwotrus dv",
            "server ca",
            "write",
            "malware",
            "encrypt",
            "as36647 oath",
            "backdoor",
            "trojan",
            "all scoreblue",
            "ipv4",
            "urls",
            "ransom",
            "trojan features",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "memcommit",
            "read c",
            "win32",
            "icmp traffic",
            "memreserve",
            "showing",
            "exploit",
            "mirai",
            "barbuda",
            "barbuda unknown",
            "hacktool",
            "program",
            "python",
            "macintosh",
            "intel mac",
            "os x",
            "khtml",
            "gecko",
            "bios",
            "guard",
            "updater",
            "launcher",
            "div div",
            "span div",
            "span svg",
            "status",
            "bugs",
            "span",
            "meta",
            "path",
            "div h3",
            "telegram strong",
            "a li",
            "virtool",
            "class",
            "tour",
            "read",
            "delete",
            "top source",
            "top destination",
            "as46606",
            "change",
            "moved",
            "certificate",
            "creation date",
            "record value",
            "suite",
            "hostname",
            "cookie",
            "asnone united",
            "as29873",
            "cname",
            "domain",
            "url analysis",
            "redacted for",
            "script urls",
            "a domains",
            "as8560",
            "germany unknown",
            "name servers",
            "for privacy",
            "files",
            "verdict",
            "as393245 oath",
            "mtb sep",
            "servers",
            "expiration date",
            "overview domain",
            "files ip",
            "address",
            "location united",
            "asn as22612",
            "whois registrar",
            "namecheap inc",
            "as22612",
            "content type",
            "apache",
            "secure server",
            "dnssec",
            "meta http",
            "content",
            "gmt server",
            "litespeed x",
            "http scans",
            "equiv cache",
            "script endif",
            "create c",
            "wow64",
            "slcc2",
            "media center",
            "write c",
            "next",
            "dock",
            "execution",
            "capture",
            "xport",
            "united kingdom",
            "a nxdomain",
            "as24940 hetzner",
            "emails",
            "script script",
            "param",
            "script",
            "ul div",
            "global domains",
            "international",
            "bank",
            "agent",
            "stack",
            "life",
            "win32mydoom sep",
            "title",
            "enigmaprotector",
            "dynamic",
            "powershell",
            "filehash",
            "worm",
            "a div",
            "all search",
            "lowfi",
            "copyright",
            "as54994 quantil",
            "as15169",
            "virustotal",
            "drweb",
            "vipre",
            "downloader",
            "panda",
            "local",
            "dns replication",
            "technology",
            "server",
            "privacy billing",
            "email",
            "registrar abuse",
            "organization",
            "privacy tech",
            "privacy admin",
            "algorithm",
            "first",
            "v3 serial",
            "number",
            "cus ogoogle",
            "trust",
            "cnwe1 validity",
            "subject public",
            "key info",
            "key algorithm",
            "scan endpoints",
            "pulse pulses",
            "federation asn",
            "as49505",
            "labs pulses",
            "internet",
            "iana",
            "city",
            "los angeles",
            "orgabusephone",
            "orgid",
            "iana ref",
            "orgtechhandle",
            "iana special",
            "103.28.36.182",
            "pegasus",
            "103.224.212.222",
            "103.129.252.44",
            "162.0.215.111",
            "apple",
            "apple-access.com",
            "as8075",
            "date",
            "phishing",
            "csam",
            "pii",
            "piiexposure",
            "flag",
            "domain address",
            "llc name",
            "contacted hosts",
            "ip address",
            "process details"
          ],
          "references": [
            "Telegram | Indicator: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP",
            "Telegram - https://t.me/login/***** | fFileHash-SHA256 cecaa6014e0cdc41ead0b076169175c9342a2ccc4b3e48549f88ea87ba8c034",
            "Alerts: injection_inter_process creates_largekey network_bind persistence_autorun persistence_autorun_tasks",
            "Alerts: spawns_dev_util cape_detected_threat injection_process_hollowing antivm_generic_services",
            "Alerts: deletes_executed_files injection_runpe persistence_ads suspicious_command_tools anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading resumethread_remote_process powershell_download powershell_request",
            "*WEBSITE.WS Your Internet Address For Life",
            "Telegram | IP 66.235.200.146 | Indicator Possible recent Mirai infection",
            "Datacenter / Hosting / VPS Reverse DNS host77.ipowerweb.com Location United States",
            "IDS Detections: W32/Zbot.Variant Fake MSIE 6.0 UA FormBook CnC Checkin (GET) FormBook CnC Checkin (GET) FormBook CnC Checkin (GET)",
            "User-Agent (Mozilla) - Possible Spyware Related WinHttpRequest Downloading EXE Likely Evil EXE download from WinHttpRequest non-exe extension",
            "ASN AS13335 cloudflare DNS Resolutions",
            "0.0.0.0 log4shell-generic-z8lrtjkgkm4zhi6necwi.r.nessus.org",
            "IDS: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP | Not Russia - Americans Masquerading",
            "federallegionconnbot.t.me",
            "thevipporn.com porn25.com lowendporn.com pz7.iqg29.cn",
            "pegasusintel.com",
            "appleid-support.com  apple-access.com appleid-support.com   demo171.apple.com apple.k8s.joewa.com w-t-blu-371ac852.cloudapp.net",
            "log4shell-generic-ammqgekxvatp3a2qyw71ten.r.nessus.org play.google.com demo171.apple.com apps.apple.com",
            "Alleged CSAM  Alleged Phishing   Alleged PIIExposure",
            "https://t.me/login/36861  = GET  /login/36861 | Server: nginx/1.18.0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "Win32:PWSX-gen\\ [Trj]",
              "display_name": "Win32:PWSX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba",
              "display_name": "Trojan:Win32/Glupteba",
              "target": "/malware/Trojan:Win32/Glupteba"
            },
            {
              "id": "Trojan:Win32/Kryptik",
              "display_name": "Trojan:Win32/Kryptik",
              "target": "/malware/Trojan:Win32/Kryptik"
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Win.Packed.Enigma-10023199-0",
              "display_name": "Win.Packed.Enigma-10023199-0",
              "target": null
            },
            {
              "id": "TEL:Exploit:O97M/CVE-2017-8570",
              "display_name": "TEL:Exploit:O97M/CVE-2017-8570",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco",
              "target": null
            },
            {
              "id": "SLFPER:SoftwareBundler:Win32/Dlhelper",
              "display_name": "SLFPER:SoftwareBundler:Win32/Dlhelper",
              "target": null
            },
            {
              "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1226,
            "FileHash-SHA256": 1691,
            "FileHash-MD5": 807,
            "FileHash-SHA1": 781,
            "URL": 429,
            "hostname": 1124,
            "SSLCertFingerprint": 7,
            "CVE": 1,
            "email": 16,
            "CIDR": 1
          },
          "indicator_count": 6083,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "550 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66514f062b3ccb6b2fab33fa",
          "name": "dinfo.pl",
          "description": "",
          "modified": "2024-05-25T02:37:58.005000",
          "created": "2024-05-25T02:37:58.005000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 347
          },
          "indicator_count": 347,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 177,
          "modified_text": "694 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d257bb241c4fa3f68d",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:02.291000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "776 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d6df9d36bac14ccd87",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:06.808000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8134,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "776 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a7e576b3cbdf2f86a32acc",
          "name": "Skynet | prd.connectforhealthco.com | Identity theft |",
          "description": "Remote interception of health insurance applicants call.  Social engineering - threat actor will walk target through process beginning with; verification of phone model, browser used, phone number, email, ssn# entered in staged health insurance enrollment application. Auto forwards ssn#  to Experian, locking consumer from of all accounts, credit information is stolen, consumer identity theft. New accounts cannot be created, a password reset is required for scam, all emails requested,  bad actor will ask for entire households email accounts, device use, etc.  Sends malicious forms to devices. Takes consumer through a lengthy phone transfer scheme  +++",
          "modified": "2024-02-16T13:04:46.804000",
          "created": "2024-01-17T14:34:30.204000",
          "tags": [
            "whois record",
            "historical ssl",
            "ssl certificate",
            "april",
            "referrer",
            "threat roundup",
            "communicating",
            "whois",
            "rwi dtools",
            "jekyll",
            "metro",
            "skynet",
            "identity theft",
            "parking crew",
            "whois whois",
            "resolutions",
            "october",
            "august",
            "march",
            "june",
            "attack",
            "goldfinder",
            "sibot",
            "hacktool",
            "remote attack",
            "social engineering",
            "read c",
            "get autoit",
            "search",
            "regsetvalueexa",
            "show",
            "entries",
            "regdword",
            "intel",
            "ms windows",
            "showing",
            "autoit",
            "write",
            "worm",
            "copy",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "malware",
            "autorun",
            "redacted for",
            "for privacy",
            "name servers",
            "date",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "encrypt",
            "next",
            "sabey",
            "no expiration",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "iocs",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "malware beacon",
            "useragent",
            "http request",
            "hostile",
            "autoit windows",
            "automation tool",
            "forbidden",
            "algorithm",
            "full name",
            "v3 serial",
            "number",
            "issuer",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "info",
            "first",
            "detections type",
            "name",
            "javascript",
            "pdf community",
            "office open",
            "xml spreadsheet",
            "text",
            "siblings",
            "process32nextw",
            "fjlsedauv",
            "writeconsolea",
            "medium",
            "discovery",
            "high",
            "module load",
            "t1129",
            "united",
            "as63949 linode",
            "mtb jan",
            "passive dns",
            "backdoor",
            "mtb dec",
            "open",
            "body",
            "artro",
            "creation date",
            "servers",
            "urls",
            "record value",
            "expiration date",
            "vt graph",
            "parent referrer",
            "apple private",
            "data collection",
            "hidden privacy",
            "malicious",
            "verified",
            "utc submissions",
            "submitters",
            "summary iocs",
            "graph community",
            "tucows",
            "amazonaes",
            "china telecom",
            "group",
            "cloudflarenet",
            "akamaias",
            "pty ltd",
            "argon data",
            "communication",
            "limited",
            "digitaloceanasn",
            "twitter",
            "dropbox",
            "domainsite",
            "alibaba cloud",
            "computing",
            "beijing",
            "service",
            "ip address",
            "latest",
            "virustotal",
            "unclejohn",
            "us autonomous",
            "system46606",
            "unified layer",
            "urls latest",
            "contacted",
            "historical",
            "subdomains",
            "gootloader",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "binary",
            "sameorigin",
            "scammer",
            "spammer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "Sibot - S0589",
              "display_name": "Sibot - S0589",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
              "display_name": "Downloader.Cerber/JS!1.A59C (CLASSIC)",
              "target": null
            },
            {
              "id": "W32/Expiro.fam",
              "display_name": "W32/Expiro.fam",
              "target": null
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1460",
              "name": "Biometric Spoofing",
              "display_name": "T1460 - Biometric Spoofing"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            }
          ],
          "industries": [
            "Healthcare",
            "Insurance",
            "Finance",
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 515,
            "FileHash-SHA1": 504,
            "FileHash-SHA256": 3557,
            "URL": 5450,
            "domain": 1842,
            "hostname": 2221,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 14097,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "793 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64c5661786ba5c7070b56acb",
          "name": "IONOS Postmaster",
          "description": "",
          "modified": "2023-09-01T05:04:37.600000",
          "created": "2023-07-29T19:18:47.883000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 720,
            "domain": 603,
            "FileHash-SHA256": 54,
            "hostname": 817,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 7,
            "email": 33,
            "CVE": 36
          },
          "indicator_count": 2275,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 86,
          "modified_text": "961 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64c57656f832cb02892c5b37",
          "name": "IONOS.CA (WHO IS NIC)",
          "description": "",
          "modified": "2023-09-01T02:01:00.192000",
          "created": "2023-07-29T20:28:06.026000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64c5661786ba5c7070b56acb",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 239,
            "domain": 281,
            "FileHash-SHA256": 89,
            "hostname": 501,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 4,
            "email": 33,
            "CVE": 36
          },
          "indicator_count": 1186,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "961 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64c801b535f8fb3d3a90aab5",
          "name": "ION.CA WHO IS EMPLOYEE (CAT) RONSONWARE",
          "description": "",
          "modified": "2023-09-01T00:00:32.049000",
          "created": "2023-07-31T18:47:17.215000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64c5661786ba5c7070b56acb",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 195,
            "domain": 338,
            "FileHash-SHA256": 189,
            "hostname": 768,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 4,
            "email": 34,
            "CVE": 36,
            "URI": 1
          },
          "indicator_count": 1568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "961 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "https://t.me/login/36861  = GET  /login/36861 | Server: nginx/1.18.0",
        "campaign-manager.sharecare.com",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
        "Alerts: spawns_dev_util cape_detected_threat injection_process_hollowing antivm_generic_services",
        "www.redtube.comyouporn.com",
        "https://mylegalbid.com/malwarebytes",
        "Malicious activity seen since a Pulse regarding school outage.",
        "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
        "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
        "qbot.zip",
        "0.0.0.0 log4shell-generic-z8lrtjkgkm4zhi6necwi.r.nessus.org",
        "appleid-support.com  apple-access.com appleid-support.com   demo171.apple.com apple.k8s.joewa.com w-t-blu-371ac852.cloudapp.net",
        "imp.fusioninstall.com",
        "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "mwilliams.dev@gmail.com | piratepages.com",
        "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
        "Other constitutional rights and privileges written in law where severe courses of action is allowed",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "Delete service is being used on this Threat service",
        "weconnect.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "www.anyxxxtube.net",
        "Location search was used to find device users address. It\u2019s with me.",
        "*WEBSITE.WS Your Internet Address For Life",
        "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
        "log4shell-generic-ammqgekxvatp3a2qyw71ten.r.nessus.org play.google.com demo171.apple.com apps.apple.com",
        "ns2.abovedomains.com",
        "Telegram | IP 66.235.200.146 | Indicator Possible recent Mirai infection",
        "cdn.pornsocket.com",
        "Device targeted with l RMS Modules by male in Denver, Co",
        "ww16.porn-community.porn25.com",
        "pegasusintel.com",
        "qa.companycam.com",
        "https://twitter.com/PORNO_SEXYBABES",
        "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "thevipporn.com porn25.com lowendporn.com pz7.iqg29.cn",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "watchhers.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "Alleged CSAM  Alleged Phishing   Alleged PIIExposure",
        "server-3-164-143-102.nrt20.r.cloudfront.net",
        "http://45.159.189.105/bot/regex",
        "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
        "jimgaffigan.com",
        "User-Agent (Mozilla) - Possible Spyware Related WinHttpRequest Downloading EXE Likely Evil EXE download from WinHttpRequest non-exe extension",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
        "Many indicators point to an IP this block is on.",
        "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God.",
        "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
        "Target was monitored in store and followed home needed to stop multiple times , change routes.",
        "Telegram - https://t.me/login/***** | fFileHash-SHA256 cecaa6014e0cdc41ead0b076169175c9342a2ccc4b3e48549f88ea87ba8c034",
        "https://discussions.apple.com/thread/255214328?sortBy=rank",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "swarm-foundry.com",
        "https://ww41.porn25.com/",
        "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "Prometheus - Alien God? Morality through the eyes of the immoral",
        "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
        "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
        "Telegram | Indicator: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Nippon Telegraph and Telephone Corporation one governmental now privated",
        "24-70mm.camera",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "federallegionconnbot.t.me",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
        "Attempts to clip target at high rate of speed.Seen again at her residence in October",
        "youramateuporn.com",
        "cams4all.com",
        "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
        "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "static-push-preprod.porndig.com",
        "prometheus.dev.aws.finoa.io",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "Alerts: injection_inter_process creates_largekey network_bind persistence_autorun persistence_autorun_tasks",
        "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
        "ASN AS13335 cloudflare DNS Resolutions",
        "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
        "xhamster.comyouporn.com",
        "It\u2019s so out of hand,m for 16 people.",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
        "IDS: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP | Not Russia - Americans Masquerading",
        "Alerts: deletes_executed_files injection_runpe persistence_ads suspicious_command_tools anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading resumethread_remote_process powershell_download powershell_request",
        "IDS Detections: W32/Zbot.Variant Fake MSIE 6.0 UA FormBook CnC Checkin (GET) FormBook CnC Checkin (GET) FormBook CnC Checkin (GET)",
        "Datacenter / Hosting / VPS Reverse DNS host77.ipowerweb.com Location United States",
        "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
        "prometheus.netmaker.vonnue.dev",
        "yoursexy.porn | indianyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
        "dropboxpayments.com",
        "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "pirateproxy.cc",
        "http://xred.mooo.com",
        "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
        "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
        "838114.parkingcrew.net"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Kimsuky",
            "Slfper:softwarebundler:win32/dlhelper",
            "Downloader.cerber/js!1.a59c (classic)",
            "#lowfi:lua:autoitv3craftedoverlay",
            "Backdoor:win32/tofsee",
            "Mirai",
            "Trojan:win32/glupteba",
            "Win.packed.enigma-10023199-0",
            "Sibot - s0589",
            "Tofsee",
            "Goldfinder",
            "Tel:exploit:o97m/cve-2017-8570",
            "Hacktool",
            "Trojan:win32/mydoom",
            "Artro",
            "Win32:pwsx-gen\\ [trj]",
            "W32/expiro.fam",
            "Virtool",
            "Skynet",
            "Adware affiliate",
            "Win.packer.pkr_ce1a-9980177-0",
            "Verified",
            "Alf:heraklezeval:trojan:win32/ymacco",
            "Azorult cnc",
            "Trojan:win32/kryptik",
            "Possible"
          ],
          "industries": [
            "Finance",
            "Telecommunications",
            "Healthcare",
            "Government",
            "Technology",
            "Insurance"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 15,
  "pulses": [
    {
      "id": "69a02837827feb0b78fa3ad2",
      "name": "The Belasco Chain",
      "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
      "modified": "2026-04-19T09:34:35.173000",
      "created": "2026-02-26T11:02:15.932000",
      "tags": [
        "file size",
        "mwdb",
        "bazaar",
        "sha3384",
        "ssdeep",
        "file type",
        "sha1",
        "sha256",
        "crc32",
        "filenames c"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2805,
        "FileHash-SHA1": 2568,
        "FileHash-SHA256": 7488,
        "domain": 1883,
        "hostname": 1466,
        "URL": 1179,
        "email": 46,
        "CVE": 46,
        "CIDR": 3,
        "YARA": 7,
        "IPv4": 94,
        "JA3": 1
      },
      "indicator_count": 17586,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 53,
      "modified_text": "11 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a552fd9d101a62085afa08",
      "name": "48f3d614d7a5bb1d98de0387af6f48fb8d08f892982821bbe9fd7dc867185454",
      "description": "More to come. #acoupleofbadapples",
      "modified": "2026-04-01T09:17:38.908000",
      "created": "2026-03-02T09:06:05.279000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 39,
        "FileHash-SHA1": 45,
        "FileHash-SHA256": 202,
        "CIDR": 2,
        "URL": 24,
        "domain": 121,
        "hostname": 23,
        "email": 6
      },
      "indicator_count": 462,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a1702ccff0b6afd6c01180",
      "name": "Strategic Intel Brief: The \"Shadow Corridor\" Persistence",
      "description": "The forensic convergence of the September 26, 2025, shadow renewal and the May 2, 2025, certificate issuance (925a10) confirms a high-fidelity infrastructure alignment targeting the Port of Portland\u2019s aviation assets. By embedding an unauthorized clientAuth extension within a legitimate Amazon RSA signature, the adversary bridged the gap between web traffic and hardware-level telematics, facilitating a sophisticated identity packaging campaign. This operation leveraged the 159,942 Majestic Trust Rank to validate a Serial 1 SOA shadow zone, utilizing ASP.NET Core request smuggling via the 13.32.205.51 node to maintain a low-noise presence across the PDX-HIO-TTD corridor. This alignment is evidenced by the 60-second TTL rotation of 3.169.202.x collection nodes, while the Network Solutions registrant shift to the hex-encoded 3432650ec... ID provides the final administrative anchor for the 2031 lease.",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-02-27T10:21:32.721000",
      "tags": [
        "a div",
        "div div",
        "click",
        "span",
        "class",
        "travelers span",
        "div language",
        "cultureen",
        "english",
        "culturees",
        "title",
        "main"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 15,
        "FileHash-SHA1": 20,
        "URL": 225,
        "domain": 375,
        "hostname": 315,
        "email": 20,
        "FileHash-SHA256": 122,
        "CVE": 18
      },
      "indicator_count": 1110,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf6063da146ed025a8890f",
      "name": "Double Umbrella Wixc2 Followup Iocs",
      "description": "The full text of the report on GoDaddy.com, which was published on 1 January 2017, is published online by the Internet Service Authority (icann) and will not be displayed on its website.>>><<<< pretext i didnt write - refer to my double umbrella post for big IP data",
      "modified": "2026-03-22T04:18:56.895000",
      "created": "2026-03-22T03:22:11.640000",
      "tags": [
        "script urls",
        "present jun",
        "present jul",
        "a domains",
        "status",
        "present aug",
        "date",
        "united",
        "present feb",
        "meta",
        "title",
        "encrypt"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 298,
        "FileHash-SHA1": 280,
        "FileHash-SHA256": 336,
        "IPv4": 31,
        "URL": 327,
        "domain": 548,
        "email": 8,
        "hostname": 136
      },
      "indicator_count": 1964,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "28 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf65566ad1032d77814945",
      "name": "Double Umbrella Wixc2 Followup Iocs [cloned pulse by msudosos]",
      "description": "",
      "modified": "2026-03-22T03:43:18.431000",
      "created": "2026-03-22T03:43:18.431000",
      "tags": [
        "script urls",
        "present jun",
        "present jul",
        "a domains",
        "status",
        "present aug",
        "date",
        "united",
        "present feb",
        "meta",
        "title",
        "encrypt"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "69bf6063da146ed025a8890f",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 148,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 186,
        "IPv4": 31,
        "URL": 324,
        "domain": 545,
        "email": 8,
        "hostname": 136
      },
      "indicator_count": 1508,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "28 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ad46275b8f0f4e3ffaff34",
      "name": "autofill.google.apis.com",
      "description": "",
      "modified": "2026-03-08T10:25:11.943000",
      "created": "2026-03-08T09:49:27.962000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 321,
        "domain": 104,
        "email": 2,
        "URL": 1
      },
      "indicator_count": 428,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "42 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6958372ef9da31513d96bebb",
      "name": "Connected-IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation",
      "description": "Retaliation? IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation for malicious control | found in the analytics of a highly target device: I\u2019ve included related pulses from 2 other threat responders and an Apple discussion post. Surprisingly, most of the IoC\u2019s pulsed came from one page of analytics. | \u2022 \"avconferenced\", \"procPath\" : \"\\/usr\\/libexec\\/avconferenced |  180.4.1.2 | a version of\npegasus found. | https://prometheus-pushgateway-internal.preview.tp-staging.com/\t\nhostname: prometheus.netmaker.vonnue.dev\t\nhostname: prometheus.dev.aws.finoa.io |\nSince Prometheus pulse . I realize now every Prometheus pulse illicits outrageous behavior.. Is this a secret society? Try to be more secretive. Owl heads in lawn. This behavior illicits investigation for a fix. Please STOP. I\u2019m done looking at Prometheus. Please stop leaving artifacts.",
      "modified": "2026-02-01T20:00:08.812000",
      "created": "2026-01-02T21:22:54.247000",
      "tags": [
        "syscall",
        "nsrunloop",
        "objcclass",
        "region type",
        "start",
        "vsize",
        "prtmax shrmod",
        "region detailn",
        "unused space",
        "at startn",
        "guard",
        "urls",
        "url analysis",
        "verdict",
        "domain",
        "address",
        "location japan",
        "hikone",
        "japan asn",
        "as4713 ntt",
        "related tags",
        "none external",
        "aaaa",
        "united",
        "passive dns",
        "ip address",
        "japan",
        "present dec",
        "domain add",
        "files",
        "japan unknown",
        "present jul",
        "present oct",
        "present sep",
        "present aug",
        "present jun",
        "japan showing",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "reverse dns",
        "present nov",
        "present",
        "present may",
        "present mar",
        "present apr",
        "data upload",
        "extraction",
        "failed",
        "files ip",
        "moved",
        "gmt content",
        "ipv4 add",
        "location united",
        "title",
        "ipv4",
        "dns resolutions",
        "hostname add",
        "asn as4713",
        "all ipv4",
        "google",
        "ocn ntt",
        "googlecl",
        "http",
        "amazon02",
        "akamaias",
        "page url",
        "yahoojp",
        "december",
        "jp summary",
        "february",
        "asn15169",
        "tokyo",
        "kansas city",
        "asn396982",
        "asn30286",
        "asn16509",
        "cisco",
        "umbrella rank",
        "cisco umbrella",
        "rank",
        "kitashinagawa",
        "sureserver ev",
        "ca g3",
        "domains",
        "hashes",
        "microsoft",
        "docomo business",
        "ml14325",
        "as autonomous",
        "asn8075",
        "ip information",
        "ipasns ip",
        "detail domain",
        "domain tree",
        "links domain",
        "requested",
        "value",
        "automatic",
        "webgl",
        "please",
        "mr value",
        "muid value",
        "mjl function",
        "dcmlinker",
        "paq string",
        "kb script",
        "b image",
        "b script",
        "frame a344",
        "redirect chain",
        "kb document",
        "frame",
        "b xhr",
        "kb image",
        "fetch collect",
        "request chain",
        "redirected",
        "http redirect",
        "name servers",
        "redacted for",
        "servers",
        "unknown aaaa",
        "search",
        "for privacy",
        "domeny serwery",
        "verdana tahoma",
        "arial",
        "gmt contenttype",
        "meta",
        "small",
        "results jan",
        "present jan",
        "status",
        "record value",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "process details",
        "flag",
        "japan japan",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "null",
        "refresh",
        "span",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "defense evasion",
        "monitored target",
        "pulse submit",
        "wikipedia",
        "imap",
        "smtp",
        "ocn open",
        "discussion",
        "stub",
        "jprs database",
        "ocnnttocn",
        "maintenance",
        "outages notice",
        "lock status",
        "state",
        "connected",
        "organization",
        "type",
        "name",
        "server",
        "name server",
        "connected date",
        "algorithm",
        "key identifier",
        "data",
        "v3 serial",
        "number",
        "cjp ocybertrust",
        "ev ca",
        "g3 validity",
        "ku ontt",
        "docomo",
        "record type",
        "ttl value",
        "thumbprint",
        "emails",
        "date",
        "trojan",
        "pegasus",
        "title error",
        "hostname",
        "pulse pulses",
        "entries",
        "mtb apr",
        "lowfi",
        "win32",
        "a domains",
        "body",
        "worm",
        "virtool",
        "cybota",
        "showing",
        "palantir",
        "prometheus"
      ],
      "references": [
        "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
        "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
        "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
        "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
        "Nippon Telegraph and Telephone Corporation one governmental now privated",
        "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
        "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
        "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
        "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
        "https://discussions.apple.com/thread/255214328?sortBy=rank",
        "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
        "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
        "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
        "swarm-foundry.com",
        "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
        "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
        "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
        "server-3-164-143-102.nrt20.r.cloudfront.net",
        "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
        "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
        "https://ww41.porn25.com/",
        "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
        "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
        "Other constitutional rights and privileges written in law where severe courses of action is allowed",
        "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
        "Device targeted with l RMS Modules by male in Denver, Co",
        "Attempts to clip target at high rate of speed.Seen again at her residence in October",
        "Target was monitored in store and followed home needed to stop multiple times , change routes.",
        "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
        "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
        "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
        "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
        "Malicious activity seen since a Pulse regarding school outage.",
        "Location search was used to find device users address. It\u2019s with me.",
        "Delete service is being used on this Threat service",
        "Many indicators point to an IP this block is on.",
        "It\u2019s so out of hand,m for 16 people.",
        "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
        "prometheus.netmaker.vonnue.dev",
        "prometheus.dev.aws.finoa.io",
        "Prometheus - Alien God? Morality through the eyes of the immoral",
        "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2879,
        "domain": 1372,
        "URL": 5788,
        "FileHash-SHA256": 1720,
        "CVE": 1,
        "FileHash-MD5": 238,
        "FileHash-SHA1": 241,
        "email": 13
      },
      "indicator_count": 12252,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "77 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e87da28b9c1611223c1a6b",
      "name": "Telegram - Remote install | log4shell-generic | Botnet | Pegasus Relationship",
      "description": "0.0.0.0 Day: Exploiting Localhost APIs From the Browser.\nA root of device issues: \nTarget was remotely subscribed to Telegram 10/23. This phone silently made 2 calls to (380) 222-3333. An activation code for blacklisted t.me/login/***** received by text. Target remembers this occured during sleep. Pegasus relationship. Mirai relationship auto-populated. Reference to new  Mirai infection. I didn't find  Mirai IoC's\nBrian Hau? Lol, idk about that.\n|| SLFPER:SoftwareBundler:Win32/Dlhelper\n#Lowfi:LUA:AutoItV3CraftedOverlay\nALF:HeraklezEval:Trojan:Win32/Ymacco\nBackdoor:Win32/Tofsee\nMirai\nTEL:Exploit:O97M/CVE-2017-8570\nTofsee\nTrojan:Win32/Glupteba\nTrojan:Win32/Kryptik\nTrojan:Win32/Mydoom\nWin.Packed.Enigma-10023199-0\nWin.Packer.pkr_ce1a-9980177-0\nWin32:PWSX-gen\\ [Trj]",
      "modified": "2024-10-16T15:00:45.833000",
      "created": "2024-09-16T18:49:06.831000",
      "tags": [
        "dynamicloader",
        "high",
        "windows",
        "medium",
        "grum",
        "yara detections",
        "contacted",
        "installs",
        "windows startup",
        "application",
        "tofsee",
        "stream",
        "less see",
        "copy",
        "aaaa",
        "virgin islands",
        "whitelisted",
        "antigua",
        "org domains",
        "proxy",
        "code",
        "search",
        "united",
        "unknown",
        "msie",
        "chrome",
        "passive dns",
        "formbook cnc",
        "checkin",
        "entries",
        "body",
        "possible",
        "mozilla",
        "delete c",
        "windows nt",
        "show",
        "owotrus ca",
        "limited",
        "cnwotrus dv",
        "server ca",
        "write",
        "malware",
        "encrypt",
        "as36647 oath",
        "backdoor",
        "trojan",
        "all scoreblue",
        "ipv4",
        "urls",
        "ransom",
        "trojan features",
        "related pulses",
        "file samples",
        "files matching",
        "date hash",
        "memcommit",
        "read c",
        "win32",
        "icmp traffic",
        "memreserve",
        "showing",
        "exploit",
        "mirai",
        "barbuda",
        "barbuda unknown",
        "hacktool",
        "program",
        "python",
        "macintosh",
        "intel mac",
        "os x",
        "khtml",
        "gecko",
        "bios",
        "guard",
        "updater",
        "launcher",
        "div div",
        "span div",
        "span svg",
        "status",
        "bugs",
        "span",
        "meta",
        "path",
        "div h3",
        "telegram strong",
        "a li",
        "virtool",
        "class",
        "tour",
        "read",
        "delete",
        "top source",
        "top destination",
        "as46606",
        "change",
        "moved",
        "certificate",
        "creation date",
        "record value",
        "suite",
        "hostname",
        "cookie",
        "asnone united",
        "as29873",
        "cname",
        "domain",
        "url analysis",
        "redacted for",
        "script urls",
        "a domains",
        "as8560",
        "germany unknown",
        "name servers",
        "for privacy",
        "files",
        "verdict",
        "as393245 oath",
        "mtb sep",
        "servers",
        "expiration date",
        "overview domain",
        "files ip",
        "address",
        "location united",
        "asn as22612",
        "whois registrar",
        "namecheap inc",
        "as22612",
        "content type",
        "apache",
        "secure server",
        "dnssec",
        "meta http",
        "content",
        "gmt server",
        "litespeed x",
        "http scans",
        "equiv cache",
        "script endif",
        "create c",
        "wow64",
        "slcc2",
        "media center",
        "write c",
        "next",
        "dock",
        "execution",
        "capture",
        "xport",
        "united kingdom",
        "a nxdomain",
        "as24940 hetzner",
        "emails",
        "script script",
        "param",
        "script",
        "ul div",
        "global domains",
        "international",
        "bank",
        "agent",
        "stack",
        "life",
        "win32mydoom sep",
        "title",
        "enigmaprotector",
        "dynamic",
        "powershell",
        "filehash",
        "worm",
        "a div",
        "all search",
        "lowfi",
        "copyright",
        "as54994 quantil",
        "as15169",
        "virustotal",
        "drweb",
        "vipre",
        "downloader",
        "panda",
        "local",
        "dns replication",
        "technology",
        "server",
        "privacy billing",
        "email",
        "registrar abuse",
        "organization",
        "privacy tech",
        "privacy admin",
        "algorithm",
        "first",
        "v3 serial",
        "number",
        "cus ogoogle",
        "trust",
        "cnwe1 validity",
        "subject public",
        "key info",
        "key algorithm",
        "scan endpoints",
        "pulse pulses",
        "federation asn",
        "as49505",
        "labs pulses",
        "internet",
        "iana",
        "city",
        "los angeles",
        "orgabusephone",
        "orgid",
        "iana ref",
        "orgtechhandle",
        "iana special",
        "103.28.36.182",
        "pegasus",
        "103.224.212.222",
        "103.129.252.44",
        "162.0.215.111",
        "apple",
        "apple-access.com",
        "as8075",
        "date",
        "phishing",
        "csam",
        "pii",
        "piiexposure",
        "flag",
        "domain address",
        "llc name",
        "contacted hosts",
        "ip address",
        "process details"
      ],
      "references": [
        "Telegram | Indicator: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP",
        "Telegram - https://t.me/login/***** | fFileHash-SHA256 cecaa6014e0cdc41ead0b076169175c9342a2ccc4b3e48549f88ea87ba8c034",
        "Alerts: injection_inter_process creates_largekey network_bind persistence_autorun persistence_autorun_tasks",
        "Alerts: spawns_dev_util cape_detected_threat injection_process_hollowing antivm_generic_services",
        "Alerts: deletes_executed_files injection_runpe persistence_ads suspicious_command_tools anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading resumethread_remote_process powershell_download powershell_request",
        "*WEBSITE.WS Your Internet Address For Life",
        "Telegram | IP 66.235.200.146 | Indicator Possible recent Mirai infection",
        "Datacenter / Hosting / VPS Reverse DNS host77.ipowerweb.com Location United States",
        "IDS Detections: W32/Zbot.Variant Fake MSIE 6.0 UA FormBook CnC Checkin (GET) FormBook CnC Checkin (GET) FormBook CnC Checkin (GET)",
        "User-Agent (Mozilla) - Possible Spyware Related WinHttpRequest Downloading EXE Likely Evil EXE download from WinHttpRequest non-exe extension",
        "ASN AS13335 cloudflare DNS Resolutions",
        "0.0.0.0 log4shell-generic-z8lrtjkgkm4zhi6necwi.r.nessus.org",
        "IDS: Query for .su TLD (Soviet Union) Often Malware Related PE EXE or DLL Windows file download HTTP | Not Russia - Americans Masquerading",
        "federallegionconnbot.t.me",
        "thevipporn.com porn25.com lowendporn.com pz7.iqg29.cn",
        "pegasusintel.com",
        "appleid-support.com  apple-access.com appleid-support.com   demo171.apple.com apple.k8s.joewa.com w-t-blu-371ac852.cloudapp.net",
        "log4shell-generic-ammqgekxvatp3a2qyw71ten.r.nessus.org play.google.com demo171.apple.com apps.apple.com",
        "Alleged CSAM  Alleged Phishing   Alleged PIIExposure",
        "https://t.me/login/36861  = GET  /login/36861 | Server: nginx/1.18.0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "Win32:PWSX-gen\\ [Trj]",
          "display_name": "Win32:PWSX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba",
          "display_name": "Trojan:Win32/Glupteba",
          "target": "/malware/Trojan:Win32/Glupteba"
        },
        {
          "id": "Trojan:Win32/Kryptik",
          "display_name": "Trojan:Win32/Kryptik",
          "target": "/malware/Trojan:Win32/Kryptik"
        },
        {
          "id": "Backdoor:Win32/Tofsee",
          "display_name": "Backdoor:Win32/Tofsee",
          "target": "/malware/Backdoor:Win32/Tofsee"
        },
        {
          "id": "Win.Packed.Enigma-10023199-0",
          "display_name": "Win.Packed.Enigma-10023199-0",
          "target": null
        },
        {
          "id": "TEL:Exploit:O97M/CVE-2017-8570",
          "display_name": "TEL:Exploit:O97M/CVE-2017-8570",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco",
          "target": null
        },
        {
          "id": "SLFPER:SoftwareBundler:Win32/Dlhelper",
          "display_name": "SLFPER:SoftwareBundler:Win32/Dlhelper",
          "target": null
        },
        {
          "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1226,
        "FileHash-SHA256": 1691,
        "FileHash-MD5": 807,
        "FileHash-SHA1": 781,
        "URL": 429,
        "hostname": 1124,
        "SSLCertFingerprint": 7,
        "CVE": 1,
        "email": 16,
        "CIDR": 1
      },
      "indicator_count": 6083,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 232,
      "modified_text": "550 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66514f062b3ccb6b2fab33fa",
      "name": "dinfo.pl",
      "description": "",
      "modified": "2024-05-25T02:37:58.005000",
      "created": "2024-05-25T02:37:58.005000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 347
      },
      "indicator_count": 347,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 177,
      "modified_text": "694 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be56d257bb241c4fa3f68d",
      "name": "AZORult CnC",
      "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
      "modified": "2024-03-04T14:03:17.574000",
      "created": "2024-02-03T15:08:02.291000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "whois whois",
        "january",
        "historical ssl",
        "referrer",
        "april",
        "resolutions",
        "siblings domain",
        "march",
        "february",
        "obz4usfn0 http",
        "problems",
        "threat network",
        "infrastructure",
        "st201601152",
        "startpage",
        "iframe",
        "united",
        "unknown",
        "search",
        "showing",
        "united kingdom",
        "creation date",
        "aaaa",
        "cname",
        "scan endpoints",
        "all octoseek",
        "date",
        "next",
        "script urls",
        "soa nxdomain",
        "link",
        "xml title",
        "portugal",
        "domain",
        "status",
        "expiration date",
        "pulse pulses",
        "as44273 host",
        "domain robot",
        "as61969 team",
        "body",
        "as8075",
        "netherlands",
        "servers",
        "emails",
        "duo insight",
        "type",
        "asnone united",
        "name servers",
        "germany unknown",
        "passive dns",
        "as14061",
        "as49453",
        "lowfi",
        "a domains",
        "urls",
        "privacy inc",
        "customer",
        "trojandropper",
        "dynamicloader",
        "default",
        "medium",
        "entries",
        "khtml",
        "download",
        "show",
        "activity",
        "http",
        "copy",
        "write",
        "malware",
        "adware affiliate",
        "hostname",
        "trojan",
        "pulse submit",
        "url analysis",
        "files",
        "as212913 fop",
        "russia unknown",
        "as397240",
        "as15169 google",
        "as19237 omnis",
        "as22169 omnis",
        "as20068 hawk",
        "as133618",
        "as47846",
        "as22489",
        "encrypt",
        "record value",
        "pragma",
        "accept ch",
        "ireland unknown",
        "msie",
        "chrome",
        "style",
        "gmt setcookie",
        "as6724 strato",
        "core",
        "win32",
        "backdoor",
        "expl",
        "exploit",
        "ipv4",
        "virtool",
        "azorult cnc",
        "possible",
        "as7018 att",
        "regsetvalueexa",
        "china as4134",
        "service",
        "asnone",
        "dns lookup",
        "ransom",
        "push",
        "eternalblue",
        "recon",
        "playgame",
        "domain name",
        "as13768 aptum",
        "meta",
        "error",
        "as43350 nforce",
        "as55286",
        "as60558 phoenix",
        "ip address",
        "registrar",
        "1996",
        "contacted",
        "unlocker",
        "red team",
        "af81 http",
        "execution",
        "open",
        "whois sslcert",
        "suspicious c2",
        "cve202322518",
        "collection",
        "vt graph",
        "excel",
        "emotet",
        "metro",
        "jeffrey reimer pt",
        "sharecare",
        "tsara brashears",
        "apple",
        "icloud"
      ],
      "references": [
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "qbot.zip",
        "imp.fusioninstall.com",
        "https://mylegalbid.com/malwarebytes",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "http://45.159.189.105/bot/regex",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "xhamster.comyouporn.com",
        "cams4all.com",
        "watchhers.net",
        "weconnect.com",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "youramateuporn.com",
        "ns2.abovedomains.com",
        "ww16.porn-community.porn25.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "pirateproxy.cc",
        "mwilliams.dev@gmail.com | piratepages.com",
        "838114.parkingcrew.net",
        "static-push-preprod.porndig.com",
        "www.redtube.comyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "yoursexy.porn | indianyouporn.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "cdn.pornsocket.com",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "www.anyxxxtube.net",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "campaign-manager.sharecare.com",
        "qa.companycam.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "24-70mm.camera",
        "dropboxpayments.com",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "http://xred.mooo.com",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "jimgaffigan.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United Kingdom of Great Britain and Northern Ireland",
        "United States of America",
        "Netherlands",
        "Germany",
        "France"
      ],
      "malware_families": [
        {
          "id": "Adware Affiliate",
          "display_name": "Adware Affiliate",
          "target": null
        },
        {
          "id": "AZORult CnC",
          "display_name": "AZORult CnC",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 737,
        "FileHash-SHA1": 692,
        "FileHash-SHA256": 7488,
        "URL": 6694,
        "domain": 5247,
        "hostname": 2932,
        "email": 49,
        "CVE": 2,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 23842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "776 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "stackstorage.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "stackstorage.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631222.1867821
}