{
  "type": "Domain",
  "indicator": "zipongo.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/zipongo.com",
    "alexa": "http://www.alexa.com/siteinfo/zipongo.com",
    "indicator": "zipongo.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2869296437,
      "indicator": "zipongo.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "686adf91f725a8b7f9850192",
          "name": "Dystopian Life  & Death of an American Crime Victim | Boldy predicted how she will die",
          "description": "Palantir - a data analytics company, known as a military intelligence tool. co-founded by billionaire investor , Trump supporter and Republican mega donor Musk aligned; Peter Thiel, as per New York. \n\nFounded in 2003, known for its data analytics platforms  -  Palantir Gotham & Palantir Foundry are used by government & private sectors for various applications, including defense & healthcare. The company faces criticism for its role in government surveillance & data privacy concerns.\nPalantir can be linked to malicious, malware packed , compromised malvertisements about  victim allegedly SA\u2019d by her physical therapist Jeffrey Scott Reimer DPT. Apparently target was paid a small settlement via lengthy phone battle by a man representing himself as Brian Sabey ,Esq of Hall Render. \n Palantir, admittedly designs cyber weapon that \u2018kills people\u2019. Are governments abusing to terrorize, silence  & even harm/kill American citizens.  Is this an elaborate hoax?\nTeam 8 \n#rip #plantantir #Hosanna #dystopian #targeted",
          "modified": "2025-08-05T15:03:36.451000",
          "created": "2025-07-06T20:41:53.748000",
          "tags": [
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "url http",
            "showing",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "ipv4",
            "filehashmd5",
            "filehashsha1",
            "filehashsha256",
            "indicators show",
            "search",
            "reputation",
            "et att",
            "ck id",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "scan",
            "iocs",
            "learn more",
            "hostname",
            "types of",
            "pagehrsappjbpst",
            "actionu",
            "focusapplicant",
            "siteid1",
            "postingseq1",
            "t1036",
            "t1043",
            "port",
            "t1085",
            "rundll32",
            "t1114",
            "t1179",
            "fbi flash",
            "cu000163mw",
            "compromise",
            "found",
            "uunet",
            "code",
            "reverse domain",
            "lookup",
            "ragnar",
            "locker",
            "ragnar locker",
            "cidr",
            "pulses",
            "types",
            "windows",
            "linux",
            "united",
            "trojandropper",
            "mtb jun",
            "trojan",
            "win32upatre aug",
            "mtb may",
            "gmt server",
            "ecacc",
            "files",
            "suspicious",
            "body",
            "data upload",
            "extraction",
            "cve cve20170147",
            "cve cve20178570",
            "cve cve20178977",
            "url feb",
            "pulses hostname",
            "a1sticas",
            "next associated",
            "present mar",
            "present jun",
            "present may",
            "france",
            "date",
            "ip address",
            "present apr",
            "virtool",
            "name servers",
            "value emails",
            "name john",
            "shipton",
            "dynadot privacy",
            "po box",
            "city san",
            "mateo country",
            "us creation",
            "news videos",
            "maps assist",
            "search settings",
            "safe search",
            "date more",
            "images bae",
            "systems defense",
            "bae systems",
            "london",
            "britain",
            "akamai rank",
            "script urls",
            "status",
            "a domains",
            "accept encoding",
            "unknown ns",
            "meta",
            "encrypt",
            "https",
            "report spam",
            "created",
            "year ago",
            "modified",
            "octoseek public",
            "cyber attack",
            "pegasus",
            "westlaw",
            "hallrender",
            "front",
            "sabey",
            "enter s",
            "include review",
            "exclude sugges",
            "failed",
            "sc type",
            "extr included",
            "manually add",
            "puls",
            "excludedocs",
            "sugges data",
            "phishing",
            "apple pegasus",
            "detections",
            "references",
            "stranger things",
            "http",
            "yara",
            "upx alerts",
            "fort collins",
            "help4u",
            "communications",
            "orgtechhandle",
            "domain",
            "no entries",
            "cchk asnas26658",
            "vj92",
            "search filter",
            "time sabey",
            "x show",
            "indicator type",
            "email",
            "filehashimphash",
            "filehashpehash",
            "backdoor",
            "ransom",
            "checkin",
            "alphacrypt cnc",
            "beacon",
            "jeffrey scott",
            "terse http",
            "possible",
            "accept",
            "xorddos",
            "ck ids",
            "t1512",
            "camera",
            "t1071",
            "protocol",
            "ta0001",
            "access",
            "ta0002",
            "ta0003",
            "ta0004",
            "cookie",
            "show",
            "ally",
            "melika",
            "part1",
            "trojanclicker",
            "bayrob",
            "android",
            "ransomware",
            "sakula rat",
            "t1125",
            "video capture",
            "t1566",
            "t1068",
            "t1190",
            "application",
            "t1472",
            "t1457",
            "media content",
            "social media",
            "doppelgnging",
            "t1080",
            "shared content",
            "t1449",
            "exploit ss7",
            "phone callssms",
            "enter sc",
            "type",
            "no expiration",
            "expiration",
            "months ago",
            "expiration http",
            "reimer dpt",
            "r role",
            "sa victim",
            "daisy coleman",
            "source",
            "weeks ago",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "ahtrnaah typ",
            "url url",
            "url domain",
            "pulse sthow",
            "ah types",
            "ind indicator",
            "data uptoad",
            "extrachttp",
            "dulce sphown",
            "aho data",
            "typ url",
            "url dom",
            "hos hostname",
            "hos host",
            "dom dom"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8149,
            "domain": 1067,
            "hostname": 2103,
            "FileHash-SHA256": 1617,
            "URI": 1,
            "FilePath": 1,
            "FileHash-MD5": 412,
            "FileHash-SHA1": 368,
            "CIDR": 4,
            "CVE": 6,
            "email": 10
          },
          "indicator_count": 13738,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "257 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "686c676bcc053e0fc51f01b2",
          "name": "ALL T8 research led to Firm_IP\u2019s = BoFa , WikiLeaks, United Healthcare, HCA, T-Mobile, Dish , AT&T,  Apple,+ Breaches despite other speculations with 0 relations",
          "description": "",
          "modified": "2025-08-05T15:03:36.451000",
          "created": "2025-07-08T00:33:47.021000",
          "tags": [
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "url http",
            "showing",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "ipv4",
            "filehashmd5",
            "filehashsha1",
            "filehashsha256",
            "indicators show",
            "search",
            "reputation",
            "et att",
            "ck id",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "scan",
            "iocs",
            "learn more",
            "hostname",
            "types of",
            "pagehrsappjbpst",
            "actionu",
            "focusapplicant",
            "siteid1",
            "postingseq1",
            "t1036",
            "t1043",
            "port",
            "t1085",
            "rundll32",
            "t1114",
            "t1179",
            "fbi flash",
            "cu000163mw",
            "compromise",
            "found",
            "uunet",
            "code",
            "reverse domain",
            "lookup",
            "ragnar",
            "locker",
            "ragnar locker",
            "cidr",
            "pulses",
            "types",
            "windows",
            "linux",
            "united",
            "trojandropper",
            "mtb jun",
            "trojan",
            "win32upatre aug",
            "mtb may",
            "gmt server",
            "ecacc",
            "files",
            "suspicious",
            "body",
            "data upload",
            "extraction",
            "cve cve20170147",
            "cve cve20178570",
            "cve cve20178977",
            "url feb",
            "pulses hostname",
            "a1sticas",
            "next associated",
            "present mar",
            "present jun",
            "present may",
            "france",
            "date",
            "ip address",
            "present apr",
            "virtool",
            "name servers",
            "value emails",
            "name john",
            "shipton",
            "dynadot privacy",
            "po box",
            "city san",
            "mateo country",
            "us creation",
            "news videos",
            "maps assist",
            "search settings",
            "safe search",
            "date more",
            "images bae",
            "systems defense",
            "bae systems",
            "london",
            "britain",
            "akamai rank",
            "script urls",
            "status",
            "a domains",
            "accept encoding",
            "unknown ns",
            "meta",
            "encrypt",
            "https",
            "report spam",
            "created",
            "year ago",
            "modified",
            "octoseek public",
            "cyber attack",
            "pegasus",
            "westlaw",
            "hallrender",
            "front",
            "sabey",
            "enter s",
            "include review",
            "exclude sugges",
            "failed",
            "sc type",
            "extr included",
            "manually add",
            "puls",
            "excludedocs",
            "sugges data",
            "phishing",
            "apple pegasus",
            "detections",
            "references",
            "stranger things",
            "http",
            "yara",
            "upx alerts",
            "fort collins",
            "help4u",
            "communications",
            "orgtechhandle",
            "domain",
            "no entries",
            "cchk asnas26658",
            "vj92",
            "search filter",
            "time sabey",
            "x show",
            "indicator type",
            "email",
            "filehashimphash",
            "filehashpehash",
            "backdoor",
            "ransom",
            "checkin",
            "alphacrypt cnc",
            "beacon",
            "jeffrey scott",
            "terse http",
            "possible",
            "accept",
            "xorddos",
            "ck ids",
            "t1512",
            "camera",
            "t1071",
            "protocol",
            "ta0001",
            "access",
            "ta0002",
            "ta0003",
            "ta0004",
            "cookie",
            "show",
            "ally",
            "melika",
            "part1",
            "trojanclicker",
            "bayrob",
            "android",
            "ransomware",
            "sakula rat",
            "t1125",
            "video capture",
            "t1566",
            "t1068",
            "t1190",
            "application",
            "t1472",
            "t1457",
            "media content",
            "social media",
            "doppelgnging",
            "t1080",
            "shared content",
            "t1449",
            "exploit ss7",
            "phone callssms",
            "enter sc",
            "type",
            "no expiration",
            "expiration",
            "months ago",
            "expiration http",
            "reimer dpt",
            "r role",
            "sa victim",
            "daisy coleman",
            "source",
            "weeks ago",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "ahtrnaah typ",
            "url url",
            "url domain",
            "pulse sthow",
            "ah types",
            "ind indicator",
            "data uptoad",
            "extrachttp",
            "dulce sphown",
            "aho data",
            "typ url",
            "url dom",
            "hos hostname",
            "hos host",
            "dom dom"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "686adf91f725a8b7f9850192",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8149,
            "domain": 1067,
            "hostname": 2103,
            "FileHash-SHA256": 1617,
            "URI": 1,
            "FilePath": 1,
            "FileHash-MD5": 412,
            "FileHash-SHA1": 368,
            "CIDR": 4,
            "CVE": 6,
            "email": 10
          },
          "indicator_count": 13738,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "257 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d3264283628d23b8f28b9d",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:42.621000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "566 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d32648280eb859dfca1c19",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:48.037000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "566 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cb4768b06f4da2fba5959b",
          "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
          "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
          "modified": "2024-03-14T09:04:37.097000",
          "created": "2024-02-13T10:41:44.270000",
          "tags": [
            "contacted",
            "ssl certificate",
            "contacted urls",
            "whois record",
            "whois whois",
            "relacionada",
            "execution",
            "p2404",
            "kgs0",
            "kls0",
            "lockbit",
            "lolkek",
            "emotet",
            "phishing",
            "ursnif",
            "malware",
            "core",
            "ryuk ransomware",
            "qakbot",
            "makop",
            "hacktool",
            "chaos",
            "ransomexx",
            "temp",
            "localappdata",
            "pattern match",
            "ascii text",
            "json data",
            "united",
            "indicator",
            "prefetch8",
            "observed email",
            "unicode text",
            "date",
            "hybrid",
            "win64",
            "general",
            "click",
            "strings",
            "tsara brashears",
            "suspicious",
            "falcon",
            "name verdict",
            "reinsurance",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "location united",
            "asn as13335",
            "title",
            "gmt server",
            "user agent",
            "443 ma2592000",
            "hostname",
            "encrypt",
            "script urls",
            "t matrix",
            "dch v",
            "meta",
            "trang ch",
            "body",
            "status",
            "search",
            "creation date",
            "record value",
            "domain name",
            "litespeed",
            "certificate",
            "speed",
            "next",
            "unknown",
            "ipv4",
            "reverse dns",
            "name servers",
            "expiration date",
            "showing",
            "pulse submit",
            "gandi sas",
            "moved",
            "emails",
            "servers",
            "error",
            "russia unknown",
            "as31483",
            "as12768",
            "as30943",
            "united kingdom",
            "as208722 yandex",
            "cname",
            "spyware",
            "tracking",
            "login"
          ],
          "references": [
            "workers.dev [extraction \u2022 GET request attack]",
            "ddos.dnsnb8.net [command_and_control]",
            "www.supernetforme.com  [command_and_control]",
            "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
            "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
            "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
            "CVE: CVE-2023-23397",
            "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://twitter.com/PORNO_SEXYBABES",
            "sex-ukraine.net",
            "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
            "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
            "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
            "nexus.b2btest.ertelecom.ru",
            "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
            "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
            "http://micrologin.ogspy.net/track/dhl-information-contact.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Ryuk Ransomware",
              "display_name": "Ryuk Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 127,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 4862,
            "hostname": 3571,
            "URL": 10597,
            "CVE": 3,
            "domain": 3169,
            "email": 7
          },
          "indicator_count": 22461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "766 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cb476d0566c2d07e474df5",
          "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
          "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
          "modified": "2024-03-14T09:04:37.097000",
          "created": "2024-02-13T10:41:49.140000",
          "tags": [
            "contacted",
            "ssl certificate",
            "contacted urls",
            "whois record",
            "whois whois",
            "relacionada",
            "execution",
            "p2404",
            "kgs0",
            "kls0",
            "lockbit",
            "lolkek",
            "emotet",
            "phishing",
            "ursnif",
            "malware",
            "core",
            "ryuk ransomware",
            "qakbot",
            "makop",
            "hacktool",
            "chaos",
            "ransomexx",
            "temp",
            "localappdata",
            "pattern match",
            "ascii text",
            "json data",
            "united",
            "indicator",
            "prefetch8",
            "observed email",
            "unicode text",
            "date",
            "hybrid",
            "win64",
            "general",
            "click",
            "strings",
            "tsara brashears",
            "suspicious",
            "falcon",
            "name verdict",
            "reinsurance",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "location united",
            "asn as13335",
            "title",
            "gmt server",
            "user agent",
            "443 ma2592000",
            "hostname",
            "encrypt",
            "script urls",
            "t matrix",
            "dch v",
            "meta",
            "trang ch",
            "body",
            "status",
            "search",
            "creation date",
            "record value",
            "domain name",
            "litespeed",
            "certificate",
            "speed",
            "next",
            "unknown",
            "ipv4",
            "reverse dns",
            "name servers",
            "expiration date",
            "showing",
            "pulse submit",
            "gandi sas",
            "moved",
            "emails",
            "servers",
            "error",
            "russia unknown",
            "as31483",
            "as12768",
            "as30943",
            "united kingdom",
            "as208722 yandex",
            "cname",
            "spyware",
            "tracking",
            "login"
          ],
          "references": [
            "workers.dev [extraction \u2022 GET request attack]",
            "ddos.dnsnb8.net [command_and_control]",
            "www.supernetforme.com  [command_and_control]",
            "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
            "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
            "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
            "CVE: CVE-2023-23397",
            "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://twitter.com/PORNO_SEXYBABES",
            "sex-ukraine.net",
            "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
            "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
            "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
            "nexus.b2btest.ertelecom.ru",
            "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
            "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
            "http://micrologin.ogspy.net/track/dhl-information-contact.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Ryuk Ransomware",
              "display_name": "Ryuk Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 127,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 4862,
            "hostname": 3571,
            "URL": 10597,
            "CVE": 3,
            "domain": 3169,
            "email": 7
          },
          "indicator_count": 22461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "766 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cb476d935dd560b4a3e938",
          "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
          "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
          "modified": "2024-03-14T09:04:37.097000",
          "created": "2024-02-13T10:41:49.380000",
          "tags": [
            "contacted",
            "ssl certificate",
            "contacted urls",
            "whois record",
            "whois whois",
            "relacionada",
            "execution",
            "p2404",
            "kgs0",
            "kls0",
            "lockbit",
            "lolkek",
            "emotet",
            "phishing",
            "ursnif",
            "malware",
            "core",
            "ryuk ransomware",
            "qakbot",
            "makop",
            "hacktool",
            "chaos",
            "ransomexx",
            "temp",
            "localappdata",
            "pattern match",
            "ascii text",
            "json data",
            "united",
            "indicator",
            "prefetch8",
            "observed email",
            "unicode text",
            "date",
            "hybrid",
            "win64",
            "general",
            "click",
            "strings",
            "tsara brashears",
            "suspicious",
            "falcon",
            "name verdict",
            "reinsurance",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "location united",
            "asn as13335",
            "title",
            "gmt server",
            "user agent",
            "443 ma2592000",
            "hostname",
            "encrypt",
            "script urls",
            "t matrix",
            "dch v",
            "meta",
            "trang ch",
            "body",
            "status",
            "search",
            "creation date",
            "record value",
            "domain name",
            "litespeed",
            "certificate",
            "speed",
            "next",
            "unknown",
            "ipv4",
            "reverse dns",
            "name servers",
            "expiration date",
            "showing",
            "pulse submit",
            "gandi sas",
            "moved",
            "emails",
            "servers",
            "error",
            "russia unknown",
            "as31483",
            "as12768",
            "as30943",
            "united kingdom",
            "as208722 yandex",
            "cname",
            "spyware",
            "tracking",
            "login"
          ],
          "references": [
            "workers.dev [extraction \u2022 GET request attack]",
            "ddos.dnsnb8.net [command_and_control]",
            "www.supernetforme.com  [command_and_control]",
            "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
            "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
            "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
            "CVE: CVE-2023-23397",
            "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://twitter.com/PORNO_SEXYBABES",
            "sex-ukraine.net",
            "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
            "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
            "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
            "nexus.b2btest.ertelecom.ru",
            "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
            "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
            "http://micrologin.ogspy.net/track/dhl-information-contact.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Ryuk Ransomware",
              "display_name": "Ryuk Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 127,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 4862,
            "hostname": 3571,
            "URL": 10597,
            "CVE": 3,
            "domain": 3169,
            "email": 7
          },
          "indicator_count": 22461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "766 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cb4772c3d3ad1f7accc98a",
          "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
          "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
          "modified": "2024-03-14T09:04:37.097000",
          "created": "2024-02-13T10:41:53.179000",
          "tags": [
            "contacted",
            "ssl certificate",
            "contacted urls",
            "whois record",
            "whois whois",
            "relacionada",
            "execution",
            "p2404",
            "kgs0",
            "kls0",
            "lockbit",
            "lolkek",
            "emotet",
            "phishing",
            "ursnif",
            "malware",
            "core",
            "ryuk ransomware",
            "qakbot",
            "makop",
            "hacktool",
            "chaos",
            "ransomexx",
            "temp",
            "localappdata",
            "pattern match",
            "ascii text",
            "json data",
            "united",
            "indicator",
            "prefetch8",
            "observed email",
            "unicode text",
            "date",
            "hybrid",
            "win64",
            "general",
            "click",
            "strings",
            "tsara brashears",
            "suspicious",
            "falcon",
            "name verdict",
            "reinsurance",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "location united",
            "asn as13335",
            "title",
            "gmt server",
            "user agent",
            "443 ma2592000",
            "hostname",
            "encrypt",
            "script urls",
            "t matrix",
            "dch v",
            "meta",
            "trang ch",
            "body",
            "status",
            "search",
            "creation date",
            "record value",
            "domain name",
            "litespeed",
            "certificate",
            "speed",
            "next",
            "unknown",
            "ipv4",
            "reverse dns",
            "name servers",
            "expiration date",
            "showing",
            "pulse submit",
            "gandi sas",
            "moved",
            "emails",
            "servers",
            "error",
            "russia unknown",
            "as31483",
            "as12768",
            "as30943",
            "united kingdom",
            "as208722 yandex",
            "cname",
            "spyware",
            "tracking",
            "login"
          ],
          "references": [
            "workers.dev [extraction \u2022 GET request attack]",
            "ddos.dnsnb8.net [command_and_control]",
            "www.supernetforme.com  [command_and_control]",
            "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
            "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
            "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
            "CVE: CVE-2023-23397",
            "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://twitter.com/PORNO_SEXYBABES",
            "sex-ukraine.net",
            "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
            "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
            "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
            "nexus.b2btest.ertelecom.ru",
            "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
            "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
            "http://micrologin.ogspy.net/track/dhl-information-contact.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Ryuk Ransomware",
              "display_name": "Ryuk Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 127,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 4862,
            "hostname": 3571,
            "URL": 10597,
            "CVE": 3,
            "domain": 3169,
            "email": 7
          },
          "indicator_count": 22461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "766 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c1cdc5d695c35205593bde",
          "name": "https://callback.mobileboost.me",
          "description": "cobalt strike cnc, malware, network, execution, antivm_queries_computername, tulach, schema abuse, callback, contact, malicious, boost mobile, t-mobile, targets,Tsara, brashears, cyber threat, hacking, sabey, data center, cyber, cp",
          "modified": "2024-03-07T05:01:03.052000",
          "created": "2024-02-06T06:12:21.372000",
          "tags": [
            "passive dns",
            "urls",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "address domain",
            "url https",
            "http",
            "files domain",
            "files related",
            "cname",
            "united",
            "unknown",
            "nxdomain",
            "a nxdomain",
            "ssl certificate",
            "contacted",
            "whois record",
            "resolutions",
            "whois whois",
            "historical ssl",
            "referrer",
            "problems",
            "execution",
            "subdomains",
            "startpage",
            "simda",
            "first",
            "utc submissions",
            "submitters",
            "psiusa",
            "domain robot",
            "csc corporate",
            "domains",
            "tucows",
            "ltd dba",
            "com laude",
            "twitter",
            "indonesia",
            "installer",
            "kgs0",
            "kls0",
            "redlinestealer",
            "kangen",
            "china telecom",
            "group",
            "computer",
            "company limited",
            "summary iocs",
            "malware",
            "network",
            "obz4usfn0 http",
            "contacted urls",
            "gootloader",
            "iframe",
            "stus",
            "cnus",
            "regsetvalueexa",
            "cobalt strike",
            "search",
            "regdword",
            "ssl cert",
            "tlsv1 apr",
            "cobaltstrike",
            "trojan",
            "copy",
            "write",
            "june",
            "win64",
            "porkbun llc",
            "mb opera",
            "china unicom",
            "tmobileas21928",
            "graph community",
            "china education",
            "center",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1874,
            "hostname": 2812,
            "URL": 8308,
            "FileHash-SHA256": 5549,
            "FileHash-MD5": 364,
            "FileHash-SHA1": 326,
            "email": 3,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 19237,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "773 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c012b5e56cc9474ebb701f",
          "name": "Cyber espionage & Ransomware attacks spread via Phone calls",
          "description": "Very strange and critical occurrences of businesses, healthcare facilities and individuals becoming part of a botnet and hacking attack when call connects with certain individuals. Healthcare facilities may be spreading this very critical vulnerability.  Attacker has access to every device & camera of affected.\n*Smoke Loader\nSmoke Loader is a malicious bot application that can be used to load other malware.Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins.",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-04T22:41:55.432000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 62,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c09e487b3899f3442aed96",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-05T08:37:28.774000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c012b5e56cc9474ebb701f",
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c970ef974adf44ef24c9a2",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-12T01:14:23.337000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c09e487b3899f3442aed96",
          "export_count": 65,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e1ece3b935bda6b9d3e10b",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call? II.",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-03-01T14:57:39.828000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c09e487b3899f3442aed96",
          "export_count": 88,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Enqrypted",
            "id": "272105",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bca8fcbe62297d71b47c33",
          "name": "Ragnar Locker",
          "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
          "modified": "2024-03-03T08:00:03.432000",
          "created": "2024-02-02T08:34:04.425000",
          "tags": [
            "referrer",
            "contacted",
            "whois record",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "execution",
            "historical ssl",
            "red team",
            "gang breached",
            "agent tesla",
            "redline stealer",
            "metro",
            "android",
            "urls url",
            "files",
            "kgs0",
            "kls0",
            "orgtechhandle",
            "orgtechref",
            "orgabusehandle",
            "orgdnshandle",
            "orgdnsref",
            "whois lookup",
            "netrange",
            "nethandle",
            "net108",
            "net1080000",
            "communicating",
            "urls http",
            "ransomware gang",
            "breached",
            "team",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "psiusa",
            "domain robot",
            "porkbun llc",
            "keysystems gmbh",
            "csc corporate",
            "domains",
            "domain name",
            "network pty",
            "tucows",
            "com laude",
            "dynadot inc"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8354,
            "FileHash-MD5": 104,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 2711,
            "CIDR": 5,
            "CVE": 6,
            "domain": 1489,
            "hostname": 3058,
            "email": 5
          },
          "indicator_count": 15813,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8f1e5db08cf140cdea23",
          "name": "TinyNote | Douglas County, Co Sheriff's Office | Pegasus Attacks SA victim ",
          "description": "",
          "modified": "2024-02-03T19:08:14.934000",
          "created": "2024-02-03T19:08:14.934000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85d301a253bd67048cbba",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "806 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6593c7224a0e8926c28f73d5",
          "name": "TinyNote | Douglas County, Colorado Sheriff's Office?",
          "description": "Sent to me by D*n*i*  M. P*r**h. I can't comprehend. Looks like framing and cyber tracking pf a SA victim by a sheriff best friend of reporting doctor whose wife is Douglas Co coroner. Reporting MD threatened and warned  Brashears of what would happen then warned SA PT by relating issues. Targets and associated as severe risk.",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-02T08:19:45.693000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2e3ebbb1bdfd541af3e91",
          "name": "TinyNote | Douglas County, Colorado Sheriff's Office?",
          "description": "",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-13T19:26:35.621000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6593c7224a0e8926c28f73d5",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85d301a253bd67048cbba",
          "name": "TinyNote | Douglas County, Co Sheriff's Office | Pegasus Attacks SA victim ",
          "description": "",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-30T02:21:36.334000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a2e3ebbb1bdfd541af3e91",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "808 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655bd8cdff0012b85a94364f",
          "name": "Raven",
          "description": "Source: WITHU4EVER.com \nDeepScan , browser modifier, password cracker, C2",
          "modified": "2023-12-20T21:03:27.869000",
          "created": "2023-11-20T22:08:13.877000",
          "tags": [
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "tsara brashears",
            "referrer",
            "kgs0",
            "kls0",
            "apple ios",
            "critical risk",
            "attack",
            "hacktool",
            "installer",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "value",
            "variables",
            "userrecovery",
            "raven",
            "cookies",
            "reverse dns",
            "software",
            "resource hash",
            "general full",
            "url https",
            "frankfurt",
            "main",
            "germany",
            "asn20940",
            "akamaiasn1",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "europeberlin",
            "aes256gcm",
            "no data",
            "tag count",
            "threat report",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "site top",
            "html",
            "safe site",
            "site safe",
            "maltiverse",
            "alexa top",
            "million",
            "unsafe",
            "malware",
            "riskware",
            "dropper",
            "team",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "cve201711882",
            "auslogics",
            "deepscan",
            "genpack",
            "phish",
            "phishing",
            "bank",
            "first",
            "trojanclicker",
            "bnr",
            "webtoolbar",
            "trojanspy",
            "tsara brashears",
            "contacted",
            "sides with",
            "amadey bot",
            "excel",
            "macros ursnif",
            "sneaky server",
            "replacement",
            "unauthorized",
            "black basta",
            "devoted high",
            "core",
            "emotet",
            "cowardly lion group",
            "sabey tooth group",
            "cp",
            "cyber",
            "diat",
            "infostealer",
            "password"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/393a851d6948e2a5d0d70ce884b3e0b4b9287b5d089671cac229ed63b42f0dba",
            "https://urlscan.io/result/9feaa404-2c53-480d-8571-542121740809/#indicators",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/      \u2022 Phishing",
            "http://45.159.189.105/bot/regex \u2022 Tracking Tsara Brashears Botnetwork",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 Password Cracker",
            "nr-data.net   \u2022  Apple Private Data Collection",
            "www.supernetforme.com \u2022 CNC",
            "103.224.212.219  \u2022 CNC",
            "45.159.189.105      \u2022 CNC",
            "Resource: WithU4ever.com"
          ],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "BNR",
              "display_name": "BNR",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "IceFog",
              "display_name": "IceFog",
              "target": null
            },
            {
              "id": "Sabey Tooth",
              "display_name": "Sabey Tooth",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Swrort Stager",
              "display_name": "Swrort Stager",
              "target": null
            },
            {
              "id": "TrojanClicker.",
              "display_name": "TrojanClicker.",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1059.003",
              "name": "Windows Command Shell",
              "display_name": "T1059.003 - Windows Command Shell"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1243,
            "URL": 4176,
            "FileHash-MD5": 63,
            "FileHash-SHA1": 24,
            "FileHash-SHA256": 1386,
            "domain": 518,
            "CIDR": 1,
            "CVE": 11,
            "email": 1
          },
          "indicator_count": 7423,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655bd8cfe894eabbe8ef2bc5",
          "name": "Raven",
          "description": "Source: WITHU4EVER.com \nDeepScan , browser modifier, password cracker, C2",
          "modified": "2023-12-20T21:03:27.869000",
          "created": "2023-11-20T22:08:15.066000",
          "tags": [
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "tsara brashears",
            "referrer",
            "kgs0",
            "kls0",
            "apple ios",
            "critical risk",
            "attack",
            "hacktool",
            "installer",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "november",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "value",
            "variables",
            "userrecovery",
            "raven",
            "cookies",
            "reverse dns",
            "software",
            "resource hash",
            "general full",
            "url https",
            "frankfurt",
            "main",
            "germany",
            "asn20940",
            "akamaiasn1",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "europeberlin",
            "aes256gcm",
            "no data",
            "tag count",
            "threat report",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "site top",
            "html",
            "safe site",
            "site safe",
            "maltiverse",
            "alexa top",
            "million",
            "unsafe",
            "malware",
            "riskware",
            "dropper",
            "team",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "cve201711882",
            "auslogics",
            "deepscan",
            "genpack",
            "phish",
            "phishing",
            "bank",
            "first",
            "trojanclicker",
            "bnr",
            "webtoolbar",
            "trojanspy",
            "tsara brashears",
            "contacted",
            "sides with",
            "amadey bot",
            "excel",
            "macros ursnif",
            "sneaky server",
            "replacement",
            "unauthorized",
            "black basta",
            "devoted high",
            "core",
            "emotet",
            "cowardly lion group",
            "sabey tooth group",
            "cp",
            "cyber",
            "diat",
            "infostealer",
            "password"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/393a851d6948e2a5d0d70ce884b3e0b4b9287b5d089671cac229ed63b42f0dba",
            "https://urlscan.io/result/9feaa404-2c53-480d-8571-542121740809/#indicators",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/      \u2022 Phishing",
            "http://45.159.189.105/bot/regex \u2022 Tracking Tsara Brashears Botnetwork",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 Password Cracker",
            "nr-data.net   \u2022  Apple Private Data Collection",
            "www.supernetforme.com \u2022 CNC",
            "103.224.212.219  \u2022 CNC",
            "45.159.189.105      \u2022 CNC",
            "Resource: WithU4ever.com"
          ],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "BNR",
              "display_name": "BNR",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "IceFog",
              "display_name": "IceFog",
              "target": null
            },
            {
              "id": "Sabey Tooth",
              "display_name": "Sabey Tooth",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Swrort Stager",
              "display_name": "Swrort Stager",
              "target": null
            },
            {
              "id": "TrojanClicker.",
              "display_name": "TrojanClicker.",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Crack",
              "display_name": "Crack",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1059.003",
              "name": "Windows Command Shell",
              "display_name": "T1059.003 - Windows Command Shell"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1243,
            "URL": 4176,
            "FileHash-MD5": 63,
            "FileHash-SHA1": 24,
            "FileHash-SHA256": 1386,
            "domain": 518,
            "CIDR": 1,
            "CVE": 11,
            "email": 1
          },
          "indicator_count": 7423,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cb4447c8d87ad85fa75",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:24.343000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cbe6bdbe24ecb170b24",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:34.083000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c1516990d69644fb3d0",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:57.372000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c17e69371b34a573f72",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:59.619000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655650c9b2be6cc930c92cf3",
          "name": "https://myaccount.uscis.gov/",
          "description": "HOW!?!? My device was remotely logged into this account somehow.\nThis is egregious. Silence  Threats. I have no connection to this but was contacted by a while ago. I don't know how or why a part of the government would attack a person with a TBI and C1 - S1 Spinal cord injury allegedly caused by Colorado physical therapist and protect him. Why  is victim, tracked and unsafe, receiving death threats, monitored, denied medical care, stalked EVERYWHERE.   \nEven felons aren't monitored for life. STOP.\nWill this get us killed. Do the right thing.\nGod bless America, purge the government.\nThe truth should set you fee not get you harmed.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:26:33",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655652f6ddcbf952a599cded",
          "name": "https://myaccount.uscis.gov/",
          "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:35:50.285000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65565477da453c46f05a6ac4",
          "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:42:15.123000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655657ca2e402d4f98283de9",
          "name": "https://myaccount.uscis.gov/ ",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:56:26.312000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655686e2c072557f03e9cba2",
          "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T21:17:22.087000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c52bf98f256b6a01da6",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-18T00:58:58.944000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aac25a8a2caaddf0d3b88",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-12-02T04:01:41.427000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655652f6ddcbf952a599cded",
          "export_count": 93,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a77022ab8eb59e186099",
          "name": "scan_host",
          "description": "",
          "modified": "2023-12-06T16:55:12.020000",
          "created": "2023-12-06T16:55:12.020000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a72f140326fa725a7583",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:54:07.518000",
          "created": "2023-12-06T16:54:07.518000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a71746cd05b8ffc71d86",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:43.601000",
          "created": "2023-12-06T16:53:43.601000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6f9f0cb95f36a8590b6",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:13.036000",
          "created": "2023-12-06T16:53:13.036000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6e151668215a7eb7ef6",
          "name": "Cyber Criminal Group",
          "description": "",
          "modified": "2023-12-06T16:52:49.885000",
          "created": "2023-12-06T16:52:49.885000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6cfa62bb520508659a6",
          "name": "NewOrder.doc",
          "description": "",
          "modified": "2023-12-06T16:52:31.959000",
          "created": "2023-12-06T16:52:31.959000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3dd6b4fb6460f906d0b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:57.080000",
          "created": "2023-12-06T16:39:57.080000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3cbf5835c0db09df031",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:39.015000",
          "created": "2023-12-06T16:39:39.015000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3ba609912d5c2688fda",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:22.589000",
          "created": "2023-12-06T16:39:22.589000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3aab919327802eaa6c7",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:06.882000",
          "created": "2023-12-06T16:39:06.882000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a39c62ca90307d3ed7a2",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:52.427000",
          "created": "2023-12-06T16:38:52.427000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a38ab6285fde4c69534d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:34.581000",
          "created": "2023-12-06T16:38:34.581000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a378641e02b700e2c60b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:16.858000",
          "created": "2023-12-06T16:38:16.858000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a368b24b94cdd5d344d0",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:00.732000",
          "created": "2023-12-06T16:38:00.732000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3566f101265e303109f",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:42.071000",
          "created": "2023-12-06T16:37:42.071000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a341ad3da7ce846d2d7a",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:21.524000",
          "created": "2023-12-06T16:37:21.524000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a32e67d395236553d739",
          "name": "confer.pw",
          "description": "",
          "modified": "2023-12-06T16:37:02.495000",
          "created": "2023-12-06T16:37:02.495000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a31d3f7a17df14af4915",
          "name": "-_-",
          "description": "",
          "modified": "2023-12-06T16:36:45.040000",
          "created": "2023-12-06T16:36:45.040000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a30b4e663b75369851e3",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:36:27.088000",
          "created": "2023-12-06T16:36:27.088000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "ddos.dnsnb8.net [command_and_control]",
        "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "workers.dev [extraction \u2022 GET request attack]",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "http://45.159.189.105/bot/regex \u2022 Tracking Tsara Brashears Botnetwork",
        "69.197.153.180",
        "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
        "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
        "https://www.hybrid-analysis.com/sample/393a851d6948e2a5d0d70ce884b3e0b4b9287b5d089671cac229ed63b42f0dba",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "nr-data.net",
        "This is all too strange! Corruption or Spoofed?",
        "http://watchhers.net/index.php. [ data collection]",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://twitter.com/sheriffspurlock?lang=en",
        "www.supernetforme.com [CnC]",
        "http://micrologin.ogspy.net/track/dhl-information-contact.html",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "https://ww9.0123movie.net/icons/apple-touch-icon.png",
        "joebiden.com",
        "https://remote.krogerlaw.com",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
        "message.htm.com",
        "Resource: WithU4ever.com",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "nr-data.net   \u2022  Apple Private Data Collection",
        "CVE: CVE-2023-23397",
        "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "http://watchhers.net/index.php",
        "https://urlscan.io/result/9feaa404-2c53-480d-8571-542121740809/#indicators",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "sex-ukraine.net",
        "https://www.crccolorado.com/dr-adam-sang",
        "www.supernetforme.com  [command_and_control]",
        "https://autodiscover.socket.net/Autodiscover/DEADJOE",
        "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
        "familyhandyman.com",
        "ddos.dnsnb8.net  [CnC]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
        "www.pornhub.com [password decryption]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "45.159.189.105      \u2022 CNC",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 Password Cracker",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "apple-identifiant.info",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "cs001.informativeremail-apple.zoom.com.cn",
        "quackbot? Qbot qakbot positive",
        "https://ww11.0123movie.net/icons/apple-touch-icon.png",
        "www.supernetforme.com \u2022 CNC",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "103.224.212.219  \u2022 CNC",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/      \u2022 Phishing",
        "0-courier.push.apple.com",
        "deadlineday.twitter.com",
        "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "*Patient PII & PHI at critical risk",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
        "0-i-0.xyz",
        "remotewd.com",
        "nexus.b2btest.ertelecom.ru",
        "https://attack.mitre.org/software/S0226/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "[Unnamed group]"
          ],
          "malware_families": [
            "Lumma stealer",
            "Relic",
            "Beach research",
            "Maltiverse",
            "Swrort stager",
            "Installcore",
            "Ursnif",
            "Cobalt strike - s0154",
            "Tofsee",
            "Razy",
            "Lumma",
            "Simda",
            "Formbook",
            "Redline",
            "Sabey",
            "Emotet",
            "Ransomexx",
            "Trojan.injector",
            "Icefog",
            "Suppobox",
            "Lockbit",
            "Malware",
            "Bnr",
            "Trojanclicker",
            "Iobit",
            "Lolkek",
            "Generic.malware",
            "Qbot",
            "Hallrender",
            "Sality",
            "Ransomware",
            "Webtoolbar",
            "Ryuk ransomware",
            "Trojanspy",
            "Hacktool",
            "Pws:win32/raven",
            "Quackbot",
            "Sabey tooth",
            "Unruy",
            "Trojanclicker.",
            "Qakbot",
            "Smoke loader",
            "Dangerousobject.multi",
            "Crack",
            "Gen:variant.zusy",
            "Artemis",
            "Hallgrand",
            "Defacement",
            "Makop",
            "Tinynote",
            "Comspec",
            "Mediamagnet"
          ],
          "industries": [
            "Healthcare",
            "Patients",
            "Medicine",
            "Nutritional",
            "Health",
            "Medical",
            "Civil society"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "686adf91f725a8b7f9850192",
      "name": "Dystopian Life  & Death of an American Crime Victim | Boldy predicted how she will die",
      "description": "Palantir - a data analytics company, known as a military intelligence tool. co-founded by billionaire investor , Trump supporter and Republican mega donor Musk aligned; Peter Thiel, as per New York. \n\nFounded in 2003, known for its data analytics platforms  -  Palantir Gotham & Palantir Foundry are used by government & private sectors for various applications, including defense & healthcare. The company faces criticism for its role in government surveillance & data privacy concerns.\nPalantir can be linked to malicious, malware packed , compromised malvertisements about  victim allegedly SA\u2019d by her physical therapist Jeffrey Scott Reimer DPT. Apparently target was paid a small settlement via lengthy phone battle by a man representing himself as Brian Sabey ,Esq of Hall Render. \n Palantir, admittedly designs cyber weapon that \u2018kills people\u2019. Are governments abusing to terrorize, silence  & even harm/kill American citizens.  Is this an elaborate hoax?\nTeam 8 \n#rip #plantantir #Hosanna #dystopian #targeted",
      "modified": "2025-08-05T15:03:36.451000",
      "created": "2025-07-06T20:41:53.748000",
      "tags": [
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "url http",
        "showing",
        "entries",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "ipv4",
        "filehashmd5",
        "filehashsha1",
        "filehashsha256",
        "indicators show",
        "search",
        "reputation",
        "et att",
        "ck id",
        "t1060",
        "run keys",
        "startup",
        "folder",
        "scan",
        "iocs",
        "learn more",
        "hostname",
        "types of",
        "pagehrsappjbpst",
        "actionu",
        "focusapplicant",
        "siteid1",
        "postingseq1",
        "t1036",
        "t1043",
        "port",
        "t1085",
        "rundll32",
        "t1114",
        "t1179",
        "fbi flash",
        "cu000163mw",
        "compromise",
        "found",
        "uunet",
        "code",
        "reverse domain",
        "lookup",
        "ragnar",
        "locker",
        "ragnar locker",
        "cidr",
        "pulses",
        "types",
        "windows",
        "linux",
        "united",
        "trojandropper",
        "mtb jun",
        "trojan",
        "win32upatre aug",
        "mtb may",
        "gmt server",
        "ecacc",
        "files",
        "suspicious",
        "body",
        "data upload",
        "extraction",
        "cve cve20170147",
        "cve cve20178570",
        "cve cve20178977",
        "url feb",
        "pulses hostname",
        "a1sticas",
        "next associated",
        "present mar",
        "present jun",
        "present may",
        "france",
        "date",
        "ip address",
        "present apr",
        "virtool",
        "name servers",
        "value emails",
        "name john",
        "shipton",
        "dynadot privacy",
        "po box",
        "city san",
        "mateo country",
        "us creation",
        "news videos",
        "maps assist",
        "search settings",
        "safe search",
        "date more",
        "images bae",
        "systems defense",
        "bae systems",
        "london",
        "britain",
        "akamai rank",
        "script urls",
        "status",
        "a domains",
        "accept encoding",
        "unknown ns",
        "meta",
        "encrypt",
        "https",
        "report spam",
        "created",
        "year ago",
        "modified",
        "octoseek public",
        "cyber attack",
        "pegasus",
        "westlaw",
        "hallrender",
        "front",
        "sabey",
        "enter s",
        "include review",
        "exclude sugges",
        "failed",
        "sc type",
        "extr included",
        "manually add",
        "puls",
        "excludedocs",
        "sugges data",
        "phishing",
        "apple pegasus",
        "detections",
        "references",
        "stranger things",
        "http",
        "yara",
        "upx alerts",
        "fort collins",
        "help4u",
        "communications",
        "orgtechhandle",
        "domain",
        "no entries",
        "cchk asnas26658",
        "vj92",
        "search filter",
        "time sabey",
        "x show",
        "indicator type",
        "email",
        "filehashimphash",
        "filehashpehash",
        "backdoor",
        "ransom",
        "checkin",
        "alphacrypt cnc",
        "beacon",
        "jeffrey scott",
        "terse http",
        "possible",
        "accept",
        "xorddos",
        "ck ids",
        "t1512",
        "camera",
        "t1071",
        "protocol",
        "ta0001",
        "access",
        "ta0002",
        "ta0003",
        "ta0004",
        "cookie",
        "show",
        "ally",
        "melika",
        "part1",
        "trojanclicker",
        "bayrob",
        "android",
        "ransomware",
        "sakula rat",
        "t1125",
        "video capture",
        "t1566",
        "t1068",
        "t1190",
        "application",
        "t1472",
        "t1457",
        "media content",
        "social media",
        "doppelgnging",
        "t1080",
        "shared content",
        "t1449",
        "exploit ss7",
        "phone callssms",
        "enter sc",
        "type",
        "no expiration",
        "expiration",
        "months ago",
        "expiration http",
        "reimer dpt",
        "r role",
        "sa victim",
        "daisy coleman",
        "source",
        "weeks ago",
        "tbmvid",
        "sourcelnms",
        "zx1724209326040",
        "ahtrnaah typ",
        "url url",
        "url domain",
        "pulse sthow",
        "ah types",
        "ind indicator",
        "data uptoad",
        "extrachttp",
        "dulce sphown",
        "aho data",
        "typ url",
        "url dom",
        "hos hostname",
        "hos host",
        "dom dom"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1085",
          "name": "Rundll32",
          "display_name": "T1085 - Rundll32"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1051",
          "name": "Shared Webroot",
          "display_name": "T1051 - Shared Webroot"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1506",
          "name": "Web Session Cookie",
          "display_name": "T1506 - Web Session Cookie"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1586",
          "name": "Compromise Accounts",
          "display_name": "T1586 - Compromise Accounts"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8149,
        "domain": 1067,
        "hostname": 2103,
        "FileHash-SHA256": 1617,
        "URI": 1,
        "FilePath": 1,
        "FileHash-MD5": 412,
        "FileHash-SHA1": 368,
        "CIDR": 4,
        "CVE": 6,
        "email": 10
      },
      "indicator_count": 13738,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "257 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "686c676bcc053e0fc51f01b2",
      "name": "ALL T8 research led to Firm_IP\u2019s = BoFa , WikiLeaks, United Healthcare, HCA, T-Mobile, Dish , AT&T,  Apple,+ Breaches despite other speculations with 0 relations",
      "description": "",
      "modified": "2025-08-05T15:03:36.451000",
      "created": "2025-07-08T00:33:47.021000",
      "tags": [
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "url http",
        "showing",
        "entries",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "ipv4",
        "filehashmd5",
        "filehashsha1",
        "filehashsha256",
        "indicators show",
        "search",
        "reputation",
        "et att",
        "ck id",
        "t1060",
        "run keys",
        "startup",
        "folder",
        "scan",
        "iocs",
        "learn more",
        "hostname",
        "types of",
        "pagehrsappjbpst",
        "actionu",
        "focusapplicant",
        "siteid1",
        "postingseq1",
        "t1036",
        "t1043",
        "port",
        "t1085",
        "rundll32",
        "t1114",
        "t1179",
        "fbi flash",
        "cu000163mw",
        "compromise",
        "found",
        "uunet",
        "code",
        "reverse domain",
        "lookup",
        "ragnar",
        "locker",
        "ragnar locker",
        "cidr",
        "pulses",
        "types",
        "windows",
        "linux",
        "united",
        "trojandropper",
        "mtb jun",
        "trojan",
        "win32upatre aug",
        "mtb may",
        "gmt server",
        "ecacc",
        "files",
        "suspicious",
        "body",
        "data upload",
        "extraction",
        "cve cve20170147",
        "cve cve20178570",
        "cve cve20178977",
        "url feb",
        "pulses hostname",
        "a1sticas",
        "next associated",
        "present mar",
        "present jun",
        "present may",
        "france",
        "date",
        "ip address",
        "present apr",
        "virtool",
        "name servers",
        "value emails",
        "name john",
        "shipton",
        "dynadot privacy",
        "po box",
        "city san",
        "mateo country",
        "us creation",
        "news videos",
        "maps assist",
        "search settings",
        "safe search",
        "date more",
        "images bae",
        "systems defense",
        "bae systems",
        "london",
        "britain",
        "akamai rank",
        "script urls",
        "status",
        "a domains",
        "accept encoding",
        "unknown ns",
        "meta",
        "encrypt",
        "https",
        "report spam",
        "created",
        "year ago",
        "modified",
        "octoseek public",
        "cyber attack",
        "pegasus",
        "westlaw",
        "hallrender",
        "front",
        "sabey",
        "enter s",
        "include review",
        "exclude sugges",
        "failed",
        "sc type",
        "extr included",
        "manually add",
        "puls",
        "excludedocs",
        "sugges data",
        "phishing",
        "apple pegasus",
        "detections",
        "references",
        "stranger things",
        "http",
        "yara",
        "upx alerts",
        "fort collins",
        "help4u",
        "communications",
        "orgtechhandle",
        "domain",
        "no entries",
        "cchk asnas26658",
        "vj92",
        "search filter",
        "time sabey",
        "x show",
        "indicator type",
        "email",
        "filehashimphash",
        "filehashpehash",
        "backdoor",
        "ransom",
        "checkin",
        "alphacrypt cnc",
        "beacon",
        "jeffrey scott",
        "terse http",
        "possible",
        "accept",
        "xorddos",
        "ck ids",
        "t1512",
        "camera",
        "t1071",
        "protocol",
        "ta0001",
        "access",
        "ta0002",
        "ta0003",
        "ta0004",
        "cookie",
        "show",
        "ally",
        "melika",
        "part1",
        "trojanclicker",
        "bayrob",
        "android",
        "ransomware",
        "sakula rat",
        "t1125",
        "video capture",
        "t1566",
        "t1068",
        "t1190",
        "application",
        "t1472",
        "t1457",
        "media content",
        "social media",
        "doppelgnging",
        "t1080",
        "shared content",
        "t1449",
        "exploit ss7",
        "phone callssms",
        "enter sc",
        "type",
        "no expiration",
        "expiration",
        "months ago",
        "expiration http",
        "reimer dpt",
        "r role",
        "sa victim",
        "daisy coleman",
        "source",
        "weeks ago",
        "tbmvid",
        "sourcelnms",
        "zx1724209326040",
        "ahtrnaah typ",
        "url url",
        "url domain",
        "pulse sthow",
        "ah types",
        "ind indicator",
        "data uptoad",
        "extrachttp",
        "dulce sphown",
        "aho data",
        "typ url",
        "url dom",
        "hos hostname",
        "hos host",
        "dom dom"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1085",
          "name": "Rundll32",
          "display_name": "T1085 - Rundll32"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1051",
          "name": "Shared Webroot",
          "display_name": "T1051 - Shared Webroot"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1506",
          "name": "Web Session Cookie",
          "display_name": "T1506 - Web Session Cookie"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1586",
          "name": "Compromise Accounts",
          "display_name": "T1586 - Compromise Accounts"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "686adf91f725a8b7f9850192",
      "export_count": 56,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8149,
        "domain": 1067,
        "hostname": 2103,
        "FileHash-SHA256": 1617,
        "URI": 1,
        "FilePath": 1,
        "FileHash-MD5": 412,
        "FileHash-SHA1": 368,
        "CIDR": 4,
        "CVE": 6,
        "email": 10
      },
      "indicator_count": 13738,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "257 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d3264283628d23b8f28b9d",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:42.621000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "566 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d32648280eb859dfca1c19",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:48.037000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 234,
      "modified_text": "566 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cb4768b06f4da2fba5959b",
      "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
      "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
      "modified": "2024-03-14T09:04:37.097000",
      "created": "2024-02-13T10:41:44.270000",
      "tags": [
        "contacted",
        "ssl certificate",
        "contacted urls",
        "whois record",
        "whois whois",
        "relacionada",
        "execution",
        "p2404",
        "kgs0",
        "kls0",
        "lockbit",
        "lolkek",
        "emotet",
        "phishing",
        "ursnif",
        "malware",
        "core",
        "ryuk ransomware",
        "qakbot",
        "makop",
        "hacktool",
        "chaos",
        "ransomexx",
        "temp",
        "localappdata",
        "pattern match",
        "ascii text",
        "json data",
        "united",
        "indicator",
        "prefetch8",
        "observed email",
        "unicode text",
        "date",
        "hybrid",
        "win64",
        "general",
        "click",
        "strings",
        "tsara brashears",
        "suspicious",
        "falcon",
        "name verdict",
        "reinsurance",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "location united",
        "asn as13335",
        "title",
        "gmt server",
        "user agent",
        "443 ma2592000",
        "hostname",
        "encrypt",
        "script urls",
        "t matrix",
        "dch v",
        "meta",
        "trang ch",
        "body",
        "status",
        "search",
        "creation date",
        "record value",
        "domain name",
        "litespeed",
        "certificate",
        "speed",
        "next",
        "unknown",
        "ipv4",
        "reverse dns",
        "name servers",
        "expiration date",
        "showing",
        "pulse submit",
        "gandi sas",
        "moved",
        "emails",
        "servers",
        "error",
        "russia unknown",
        "as31483",
        "as12768",
        "as30943",
        "united kingdom",
        "as208722 yandex",
        "cname",
        "spyware",
        "tracking",
        "login"
      ],
      "references": [
        "workers.dev [extraction \u2022 GET request attack]",
        "ddos.dnsnb8.net [command_and_control]",
        "www.supernetforme.com  [command_and_control]",
        "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
        "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
        "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
        "CVE: CVE-2023-23397",
        "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://twitter.com/PORNO_SEXYBABES",
        "sex-ukraine.net",
        "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
        "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
        "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
        "nexus.b2btest.ertelecom.ru",
        "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
        "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
        "http://micrologin.ogspy.net/track/dhl-information-contact.html"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Ryuk Ransomware",
          "display_name": "Ryuk Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 127,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 4862,
        "hostname": 3571,
        "URL": 10597,
        "CVE": 3,
        "domain": 3169,
        "email": 7
      },
      "indicator_count": 22461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "766 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cb476d0566c2d07e474df5",
      "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
      "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
      "modified": "2024-03-14T09:04:37.097000",
      "created": "2024-02-13T10:41:49.140000",
      "tags": [
        "contacted",
        "ssl certificate",
        "contacted urls",
        "whois record",
        "whois whois",
        "relacionada",
        "execution",
        "p2404",
        "kgs0",
        "kls0",
        "lockbit",
        "lolkek",
        "emotet",
        "phishing",
        "ursnif",
        "malware",
        "core",
        "ryuk ransomware",
        "qakbot",
        "makop",
        "hacktool",
        "chaos",
        "ransomexx",
        "temp",
        "localappdata",
        "pattern match",
        "ascii text",
        "json data",
        "united",
        "indicator",
        "prefetch8",
        "observed email",
        "unicode text",
        "date",
        "hybrid",
        "win64",
        "general",
        "click",
        "strings",
        "tsara brashears",
        "suspicious",
        "falcon",
        "name verdict",
        "reinsurance",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "location united",
        "asn as13335",
        "title",
        "gmt server",
        "user agent",
        "443 ma2592000",
        "hostname",
        "encrypt",
        "script urls",
        "t matrix",
        "dch v",
        "meta",
        "trang ch",
        "body",
        "status",
        "search",
        "creation date",
        "record value",
        "domain name",
        "litespeed",
        "certificate",
        "speed",
        "next",
        "unknown",
        "ipv4",
        "reverse dns",
        "name servers",
        "expiration date",
        "showing",
        "pulse submit",
        "gandi sas",
        "moved",
        "emails",
        "servers",
        "error",
        "russia unknown",
        "as31483",
        "as12768",
        "as30943",
        "united kingdom",
        "as208722 yandex",
        "cname",
        "spyware",
        "tracking",
        "login"
      ],
      "references": [
        "workers.dev [extraction \u2022 GET request attack]",
        "ddos.dnsnb8.net [command_and_control]",
        "www.supernetforme.com  [command_and_control]",
        "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
        "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
        "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
        "CVE: CVE-2023-23397",
        "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://twitter.com/PORNO_SEXYBABES",
        "sex-ukraine.net",
        "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
        "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
        "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
        "nexus.b2btest.ertelecom.ru",
        "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
        "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
        "http://micrologin.ogspy.net/track/dhl-information-contact.html"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Ryuk Ransomware",
          "display_name": "Ryuk Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 127,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 4862,
        "hostname": 3571,
        "URL": 10597,
        "CVE": 3,
        "domain": 3169,
        "email": 7
      },
      "indicator_count": 22461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "766 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cb476d935dd560b4a3e938",
      "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
      "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
      "modified": "2024-03-14T09:04:37.097000",
      "created": "2024-02-13T10:41:49.380000",
      "tags": [
        "contacted",
        "ssl certificate",
        "contacted urls",
        "whois record",
        "whois whois",
        "relacionada",
        "execution",
        "p2404",
        "kgs0",
        "kls0",
        "lockbit",
        "lolkek",
        "emotet",
        "phishing",
        "ursnif",
        "malware",
        "core",
        "ryuk ransomware",
        "qakbot",
        "makop",
        "hacktool",
        "chaos",
        "ransomexx",
        "temp",
        "localappdata",
        "pattern match",
        "ascii text",
        "json data",
        "united",
        "indicator",
        "prefetch8",
        "observed email",
        "unicode text",
        "date",
        "hybrid",
        "win64",
        "general",
        "click",
        "strings",
        "tsara brashears",
        "suspicious",
        "falcon",
        "name verdict",
        "reinsurance",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "location united",
        "asn as13335",
        "title",
        "gmt server",
        "user agent",
        "443 ma2592000",
        "hostname",
        "encrypt",
        "script urls",
        "t matrix",
        "dch v",
        "meta",
        "trang ch",
        "body",
        "status",
        "search",
        "creation date",
        "record value",
        "domain name",
        "litespeed",
        "certificate",
        "speed",
        "next",
        "unknown",
        "ipv4",
        "reverse dns",
        "name servers",
        "expiration date",
        "showing",
        "pulse submit",
        "gandi sas",
        "moved",
        "emails",
        "servers",
        "error",
        "russia unknown",
        "as31483",
        "as12768",
        "as30943",
        "united kingdom",
        "as208722 yandex",
        "cname",
        "spyware",
        "tracking",
        "login"
      ],
      "references": [
        "workers.dev [extraction \u2022 GET request attack]",
        "ddos.dnsnb8.net [command_and_control]",
        "www.supernetforme.com  [command_and_control]",
        "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
        "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
        "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
        "CVE: CVE-2023-23397",
        "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://twitter.com/PORNO_SEXYBABES",
        "sex-ukraine.net",
        "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
        "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
        "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
        "nexus.b2btest.ertelecom.ru",
        "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
        "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
        "http://micrologin.ogspy.net/track/dhl-information-contact.html"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Ryuk Ransomware",
          "display_name": "Ryuk Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 127,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 4862,
        "hostname": 3571,
        "URL": 10597,
        "CVE": 3,
        "domain": 3169,
        "email": 7
      },
      "indicator_count": 22461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "766 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cb4772c3d3ad1f7accc98a",
      "name": "Ryuk Ransomware - workers.dev | https://house.mo.gov",
      "description": "Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology organizations.\n\nInterestingly, this ransomware family carries a Japanese name from the anime movie Death Note. The name means \u201cgift of god.\u201d It seems an odd choice for ransomware since the targets lose data or money. From the hacker's perspective, however, it could be considered a gift of god.",
      "modified": "2024-03-14T09:04:37.097000",
      "created": "2024-02-13T10:41:53.179000",
      "tags": [
        "contacted",
        "ssl certificate",
        "contacted urls",
        "whois record",
        "whois whois",
        "relacionada",
        "execution",
        "p2404",
        "kgs0",
        "kls0",
        "lockbit",
        "lolkek",
        "emotet",
        "phishing",
        "ursnif",
        "malware",
        "core",
        "ryuk ransomware",
        "qakbot",
        "makop",
        "hacktool",
        "chaos",
        "ransomexx",
        "temp",
        "localappdata",
        "pattern match",
        "ascii text",
        "json data",
        "united",
        "indicator",
        "prefetch8",
        "observed email",
        "unicode text",
        "date",
        "hybrid",
        "win64",
        "general",
        "click",
        "strings",
        "tsara brashears",
        "suspicious",
        "falcon",
        "name verdict",
        "reinsurance",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "urls",
        "files",
        "ip address",
        "location united",
        "asn as13335",
        "title",
        "gmt server",
        "user agent",
        "443 ma2592000",
        "hostname",
        "encrypt",
        "script urls",
        "t matrix",
        "dch v",
        "meta",
        "trang ch",
        "body",
        "status",
        "search",
        "creation date",
        "record value",
        "domain name",
        "litespeed",
        "certificate",
        "speed",
        "next",
        "unknown",
        "ipv4",
        "reverse dns",
        "name servers",
        "expiration date",
        "showing",
        "pulse submit",
        "gandi sas",
        "moved",
        "emails",
        "servers",
        "error",
        "russia unknown",
        "as31483",
        "as12768",
        "as30943",
        "united kingdom",
        "as208722 yandex",
        "cname",
        "spyware",
        "tracking",
        "login"
      ],
      "references": [
        "workers.dev [extraction \u2022 GET request attack]",
        "ddos.dnsnb8.net [command_and_control]",
        "www.supernetforme.com  [command_and_control]",
        "https://www.trendmicro.com/en_us/what-is/ransomware/ryuk-ransomware.html",
        "http://www.supernetforme.com/search.php?q=2075.2075.300.4096.0.756ae987de3398fb3871e5916bf6fa3ea748bb384f297c252a6a6c52397bb6be.1.399198437 [phishing \u2022 python]",
        "https://www.milehighmedia.com/legal/2257 [Brazzers Porn Virus Network \u2022 Data collection \u2022 phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [ phishing \u2022 virus network \u2022 Apple data collection ]",
        "CVE: CVE-2023-23397",
        "0-129-112027imap-intranet-pv-175-166.matomo.cloud",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption \u2022 unlocker]",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "https://twitter.com/PORNO_SEXYBABES",
        "sex-ukraine.net",
        "http://ww38.hardsexxxtube.com/scj/thumbs/295/196_teen_Megan.jpg \u2022\t humani-teens.com",
        "feedercontroller.webcrawlingeap-prod-co4.binginternal.com",
        "accessoire-telephones.fr \u2022 bks-tv.ru [telecom] \u2022 coltel.ru  [telecom] \u2022 ceptelefondata.com.tr [data collection \u2022 USA] ts-astra.ru  [telecom] wifi.ru",
        "nexus.b2btest.ertelecom.ru",
        "Virus Network: 192.229.211.108 | Tracking: http://d1ql3z8u1oo390.cloudfront.net/offer.php?affId=7512&trackingId=433313787&instId=7584&ho_trackingid=HO433313787&cc=DE&sb=x64&wv=7sp1&db=InternetExplorer&uac=1&cid=bcbaa53dffa0965e557319f4f2155088&v=3&net=4.8.03761&ie=8.0.7601.17514&res=800x600&osd=151&kid=hqmrb21boa4c9c32d7k",
        "Tracking: trackyouremails.com \u2022 https://adservice.google.com.uy/clk",
        "http://micrologin.ogspy.net/track/dhl-information-contact.html"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Ryuk Ransomware",
          "display_name": "Ryuk Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 127,
        "FileHash-SHA1": 125,
        "FileHash-SHA256": 4862,
        "hostname": 3571,
        "URL": 10597,
        "CVE": 3,
        "domain": 3169,
        "email": 7
      },
      "indicator_count": 22461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "766 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c1cdc5d695c35205593bde",
      "name": "https://callback.mobileboost.me",
      "description": "cobalt strike cnc, malware, network, execution, antivm_queries_computername, tulach, schema abuse, callback, contact, malicious, boost mobile, t-mobile, targets,Tsara, brashears, cyber threat, hacking, sabey, data center, cyber, cp",
      "modified": "2024-03-07T05:01:03.052000",
      "created": "2024-02-06T06:12:21.372000",
      "tags": [
        "passive dns",
        "urls",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse pulses",
        "files",
        "domain",
        "files ip",
        "address domain",
        "url https",
        "http",
        "files domain",
        "files related",
        "cname",
        "united",
        "unknown",
        "nxdomain",
        "a nxdomain",
        "ssl certificate",
        "contacted",
        "whois record",
        "resolutions",
        "whois whois",
        "historical ssl",
        "referrer",
        "problems",
        "execution",
        "subdomains",
        "startpage",
        "simda",
        "first",
        "utc submissions",
        "submitters",
        "psiusa",
        "domain robot",
        "csc corporate",
        "domains",
        "tucows",
        "ltd dba",
        "com laude",
        "twitter",
        "indonesia",
        "installer",
        "kgs0",
        "kls0",
        "redlinestealer",
        "kangen",
        "china telecom",
        "group",
        "computer",
        "company limited",
        "summary iocs",
        "malware",
        "network",
        "obz4usfn0 http",
        "contacted urls",
        "gootloader",
        "iframe",
        "stus",
        "cnus",
        "regsetvalueexa",
        "cobalt strike",
        "search",
        "regdword",
        "ssl cert",
        "tlsv1 apr",
        "cobaltstrike",
        "trojan",
        "copy",
        "write",
        "june",
        "win64",
        "porkbun llc",
        "mb opera",
        "china unicom",
        "tmobileas21928",
        "graph community",
        "china education",
        "center",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1874,
        "hostname": 2812,
        "URL": 8308,
        "FileHash-SHA256": 5549,
        "FileHash-MD5": 364,
        "FileHash-SHA1": 326,
        "email": 3,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 19237,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "773 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c012b5e56cc9474ebb701f",
      "name": "Cyber espionage & Ransomware attacks spread via Phone calls",
      "description": "Very strange and critical occurrences of businesses, healthcare facilities and individuals becoming part of a botnet and hacking attack when call connects with certain individuals. Healthcare facilities may be spreading this very critical vulnerability.  Attacker has access to every device & camera of affected.\n*Smoke Loader\nSmoke Loader is a malicious bot application that can be used to load other malware.Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins.",
      "modified": "2024-03-05T22:00:26.685000",
      "created": "2024-02-04T22:41:55.432000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "execution",
        "historical ssl",
        "contacted urls",
        "whois whois",
        "zfglddkl58a url",
        "q0gpyr1balpdgpo",
        "relacionada",
        "formbook",
        "smoke loader",
        "iframe",
        "january",
        "resolutions",
        "referrer",
        "threat roundup",
        "snatch",
        "ransomware",
        "hacktool",
        "record type",
        "ttl value",
        "tsara brashears",
        "apple",
        "apple ios",
        "password bypass",
        "malware",
        "password",
        "apple phone",
        "download",
        "crypto",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "communicating",
        "el0kpmhlfz",
        "qdkxgr24yz",
        "kgs0",
        "kls0",
        "malicious",
        "phi",
        "pii",
        "dofoil",
        "worn",
        "rat",
        "network",
        "dns",
        "trojan",
        "remote",
        "phone hacking",
        "hacked by phone call",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "nginx",
        "html info",
        "information",
        "meta tags",
        "network",
        "march",
        "july",
        "september",
        "february",
        "redline stealer",
        "probe",
        "raccoonstealer",
        "no data",
        "tag count",
        "thu apr",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "asyncrat",
        "redlinestealer",
        "diamondfox",
        "first",
        "botnet command and control",
        "python connection",
        "tulach"
      ],
      "references": [
        "https://www.crccolorado.com/dr-adam-sang",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "https://attack.mitre.org/software/S0226/",
        "http://watchhers.net/index.php. [ data collection]",
        "remotewd.com",
        "https://remote.krogerlaw.com",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "www.pornhub.com [password decryption]",
        "www.supernetforme.com [CnC]",
        "ddos.dnsnb8.net  [CnC]",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "*Patient PII & PHI at critical risk"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Razy",
          "display_name": "Razy",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan.Injector",
          "display_name": "Trojan.Injector",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Defacement",
          "display_name": "Defacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1111",
          "name": "Two-Factor Authentication Interception",
          "display_name": "T1111 - Two-Factor Authentication Interception"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1555.003",
          "name": "Credentials from Web Browsers",
          "display_name": "T1555.003 - Credentials from Web Browsers"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1552.001",
          "name": "Credentials In Files",
          "display_name": "T1552.001 - Credentials In Files"
        },
        {
          "id": "T1497.001",
          "name": "System Checks",
          "display_name": "T1497.001 - System Checks"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1059.005",
          "name": "Visual Basic",
          "display_name": "T1059.005 - Visual Basic"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society",
        "Patients"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 62,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 244,
        "FileHash-SHA1": 237,
        "FileHash-SHA256": 5468,
        "URL": 3747,
        "domain": 2512,
        "hostname": 1593,
        "CVE": 4
      },
      "indicator_count": 13805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "775 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "zipongo.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "zipongo.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776660825.6307528
}