{
  "type": "Domain",
  "indicator": "webmicrosoftservicesystem.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/webmicrosoftservicesystem.com",
    "alexa": "http://www.alexa.com/siteinfo/webmicrosoftservicesystem.com",
    "indicator": "webmicrosoftservicesystem.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3814608752,
      "indicator": "webmicrosoftservicesystem.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "65df439de846ef5d34030863",
          "name": " Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
          "description": "",
          "modified": "2024-02-28T14:30:53.381000",
          "created": "2024-02-28T14:30:53.381000",
          "tags": [
            "app installer",
            "microsoft",
            "sangria tempest",
            "storm1113",
            "teams",
            "storm1674",
            "storm0569",
            "cobalt strike",
            "batloader",
            "zoom",
            "icedid",
            "defender",
            "teamviewer",
            "anydesk",
            "sharepoint",
            "ransom",
            "installer",
            "install",
            "powershell",
            "gozi",
            "redline stealer",
            "smoke loader",
            "carbanak",
            "gracewire",
            "sectoprat",
            "turn",
            "twitter"
          ],
          "references": [
            "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65943a4fa4601dc5b3028e71",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "threatmanager",
            "id": "74623",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 9,
            "URL": 2,
            "domain": 12,
            "hostname": 11
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 505,
          "modified_text": "780 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "658f613a00b269fb15b82981",
          "name": "InQuest - 29-12-2023",
          "description": "",
          "modified": "2024-01-29T00:02:58.618000",
          "created": "2023-12-30T00:15:54.738000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 58,
            "URL": 341,
            "FileHash-SHA1": 12,
            "FileHash-MD5": 165,
            "hostname": 95,
            "domain": 46
          },
          "indicator_count": 717,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "659a01e08e1cda5d80a152c3",
          "name": "App Installer Misused By Financially Motivated Threat Actors",
          "description": "",
          "modified": "2024-01-07T01:44:00.430000",
          "created": "2024-01-07T01:44:00.430000",
          "tags": [],
          "references": [
            "January 6th, 2024 - CryptoGen Cyber Threat Intelligence - #3792 - App Installer Misused By Financially Motivated Threat Actors"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "cryptocti",
            "id": "110256",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_110256/resized/80/avatar_e237a4257c.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9,
            "URL": 2,
            "domain": 12,
            "hostname": 18
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 485,
          "modified_text": "833 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65943a4fa4601dc5b3028e71",
          "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
          "description": "",
          "modified": "2024-01-02T16:31:11.535000",
          "created": "2024-01-02T16:31:11.535000",
          "tags": [
            "app installer",
            "microsoft",
            "sangria tempest",
            "storm1113",
            "teams",
            "storm1674",
            "storm0569",
            "cobalt strike",
            "batloader",
            "zoom",
            "icedid",
            "defender",
            "teamviewer",
            "anydesk",
            "sharepoint",
            "ransom",
            "installer",
            "install",
            "powershell",
            "gozi",
            "redline stealer",
            "smoke loader",
            "carbanak",
            "gracewire",
            "sectoprat",
            "turn",
            "twitter"
          ],
          "references": [
            "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658dcce279b966e492d14f47",
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "mxdrthreat",
            "id": "230035",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 9,
            "URL": 2,
            "domain": 12,
            "hostname": 11
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 54,
          "modified_text": "837 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "658eb954d6032992f229907e",
          "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
          "description": "",
          "modified": "2023-12-29T12:19:32.618000",
          "created": "2023-12-29T12:19:32.618000",
          "tags": [
            "app installer",
            "microsoft",
            "sangria tempest",
            "storm1113",
            "teams",
            "storm1674",
            "storm0569",
            "cobalt strike",
            "batloader",
            "zoom",
            "icedid",
            "darkgate",
            "defender",
            "teamviewer",
            "anydesk",
            "lumma stealer",
            "powertrash",
            "sharepoint",
            "ransom",
            "installer",
            "install",
            "powershell",
            "gozi",
            "redline stealer",
            "smoke loader",
            "carbanak",
            "gracewire",
            "sectoprat",
            "pikabot",
            "turn",
            "twitter"
          ],
          "references": [
            "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunter_NL",
            "id": "171283",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 9,
            "URL": 2,
            "domain": 12,
            "hostname": 18
          },
          "indicator_count": 48,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 845,
          "modified_text": "841 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "658dcce279b966e492d14f47",
          "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
          "description": "",
          "modified": "2023-12-28T19:30:42.750000",
          "created": "2023-12-28T19:30:42.750000",
          "tags": [
            "app installer",
            "microsoft",
            "sangria tempest",
            "storm1113",
            "teams",
            "storm1674",
            "storm0569",
            "cobalt strike",
            "batloader",
            "zoom",
            "icedid",
            "defender",
            "teamviewer",
            "anydesk",
            "sharepoint",
            "ransom",
            "installer",
            "install",
            "powershell",
            "gozi",
            "redline stealer",
            "smoke loader",
            "carbanak",
            "gracewire",
            "sectoprat",
            "turn",
            "twitter"
          ],
          "references": [
            "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "burtcha15",
            "id": "207697",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 9,
            "URL": 2,
            "domain": 12,
            "hostname": 11
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 52,
          "modified_text": "842 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://labs.inquest.net/iocdb",
        "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/",
        "January 6th, 2024 - CryptoGen Cyber Threat Intelligence - #3792 - App Installer Misused By Financially Motivated Threat Actors"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "65df439de846ef5d34030863",
      "name": " Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
      "description": "",
      "modified": "2024-02-28T14:30:53.381000",
      "created": "2024-02-28T14:30:53.381000",
      "tags": [
        "app installer",
        "microsoft",
        "sangria tempest",
        "storm1113",
        "teams",
        "storm1674",
        "storm0569",
        "cobalt strike",
        "batloader",
        "zoom",
        "icedid",
        "defender",
        "teamviewer",
        "anydesk",
        "sharepoint",
        "ransom",
        "installer",
        "install",
        "powershell",
        "gozi",
        "redline stealer",
        "smoke loader",
        "carbanak",
        "gracewire",
        "sectoprat",
        "turn",
        "twitter"
      ],
      "references": [
        "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65943a4fa4601dc5b3028e71",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "threatmanager",
        "id": "74623",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 9,
        "URL": 2,
        "domain": 12,
        "hostname": 11
      },
      "indicator_count": 41,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 505,
      "modified_text": "780 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "658f613a00b269fb15b82981",
      "name": "InQuest - 29-12-2023",
      "description": "",
      "modified": "2024-01-29T00:02:58.618000",
      "created": "2023-12-30T00:15:54.738000",
      "tags": [],
      "references": [
        "https://labs.inquest.net/iocdb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunterAutoFeed",
        "id": "182496",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 58,
        "URL": 341,
        "FileHash-SHA1": 12,
        "FileHash-MD5": 165,
        "hostname": 95,
        "domain": 46
      },
      "indicator_count": 717,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1600,
      "modified_text": "811 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "659a01e08e1cda5d80a152c3",
      "name": "App Installer Misused By Financially Motivated Threat Actors",
      "description": "",
      "modified": "2024-01-07T01:44:00.430000",
      "created": "2024-01-07T01:44:00.430000",
      "tags": [],
      "references": [
        "January 6th, 2024 - CryptoGen Cyber Threat Intelligence - #3792 - App Installer Misused By Financially Motivated Threat Actors"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "cryptocti",
        "id": "110256",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_110256/resized/80/avatar_e237a4257c.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 9,
        "URL": 2,
        "domain": 12,
        "hostname": 18
      },
      "indicator_count": 41,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 485,
      "modified_text": "833 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65943a4fa4601dc5b3028e71",
      "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
      "description": "",
      "modified": "2024-01-02T16:31:11.535000",
      "created": "2024-01-02T16:31:11.535000",
      "tags": [
        "app installer",
        "microsoft",
        "sangria tempest",
        "storm1113",
        "teams",
        "storm1674",
        "storm0569",
        "cobalt strike",
        "batloader",
        "zoom",
        "icedid",
        "defender",
        "teamviewer",
        "anydesk",
        "sharepoint",
        "ransom",
        "installer",
        "install",
        "powershell",
        "gozi",
        "redline stealer",
        "smoke loader",
        "carbanak",
        "gracewire",
        "sectoprat",
        "turn",
        "twitter"
      ],
      "references": [
        "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658dcce279b966e492d14f47",
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "mxdrthreat",
        "id": "230035",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 9,
        "URL": 2,
        "domain": 12,
        "hostname": 11
      },
      "indicator_count": 41,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 54,
      "modified_text": "837 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "658eb954d6032992f229907e",
      "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
      "description": "",
      "modified": "2023-12-29T12:19:32.618000",
      "created": "2023-12-29T12:19:32.618000",
      "tags": [
        "app installer",
        "microsoft",
        "sangria tempest",
        "storm1113",
        "teams",
        "storm1674",
        "storm0569",
        "cobalt strike",
        "batloader",
        "zoom",
        "icedid",
        "darkgate",
        "defender",
        "teamviewer",
        "anydesk",
        "lumma stealer",
        "powertrash",
        "sharepoint",
        "ransom",
        "installer",
        "install",
        "powershell",
        "gozi",
        "redline stealer",
        "smoke loader",
        "carbanak",
        "gracewire",
        "sectoprat",
        "pikabot",
        "turn",
        "twitter"
      ],
      "references": [
        "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunter_NL",
        "id": "171283",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 9,
        "URL": 2,
        "domain": 12,
        "hostname": 18
      },
      "indicator_count": 48,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 845,
      "modified_text": "841 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "658dcce279b966e492d14f47",
      "name": "Financially motivated threat actors misusing App Installer | Microsoft Security Blog",
      "description": "",
      "modified": "2023-12-28T19:30:42.750000",
      "created": "2023-12-28T19:30:42.750000",
      "tags": [
        "app installer",
        "microsoft",
        "sangria tempest",
        "storm1113",
        "teams",
        "storm1674",
        "storm0569",
        "cobalt strike",
        "batloader",
        "zoom",
        "icedid",
        "defender",
        "teamviewer",
        "anydesk",
        "sharepoint",
        "ransom",
        "installer",
        "install",
        "powershell",
        "gozi",
        "redline stealer",
        "smoke loader",
        "carbanak",
        "gracewire",
        "sectoprat",
        "turn",
        "twitter"
      ],
      "references": [
        "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "burtcha15",
        "id": "207697",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 9,
        "URL": 2,
        "domain": 12,
        "hostname": 11
      },
      "indicator_count": 41,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 52,
      "modified_text": "842 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "webmicrosoftservicesystem.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "webmicrosoftservicesystem.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776596894.5308616
}