alienvault.json•514 kB
{
"whois": "http://whois.domaintools.com/91.195.240.94",
"reputation": 0,
"indicator": "91.195.240.94",
"type": "IPv4",
"type_title": "IPv4",
"base_indicator": {
"id": 1590148289,
"indicator": "91.195.240.94",
"type": "IPv4",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 50,
"pulses": [
{
"id": "67b8768d246cba81e679fc2d",
"name": "Emotet 2022",
"description": "",
"modified": "2025-03-23T12:04:02.260000",
"created": "2025-02-21T12:50:21.693000",
"tags": [],
"references": [
"https://www.virustotal.com/graph/g30cee2c696374fdb957d8762f05b2a00456690f6ba02486b977124f6202d806d"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 6,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 84,
"FileHash-MD5": 9,
"FileHash-SHA1": 9,
"FileHash-SHA256": 139,
"domain": 30,
"hostname": 19
},
"indicator_count": 290,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 114,
"modified_text": "32 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "67ab3e44ef2e31fa23225efd",
"name": "IOC-2019-2020 (by commandline)",
"description": "",
"modified": "2025-02-11T12:16:31.335000",
"created": "2025-02-11T12:10:44.143000",
"tags": [
"ipv4address",
"domain",
"hash",
"dnsname",
"url http",
"sslcertificate",
"emailaddress",
"url https",
"pattern url",
"domain xn"
],
"references": [
"https://www.virustotal.com/graph/embed/g8248c00b8fb747cbac22a9eafe2538c76d3f073c1a40477397f15304692dbbd0?theme=dark"
],
"public": 1,
"adversary": "assumed part of the emotet distribution network and communication infrastructure",
"targeted_countries": [],
"malware_families": [
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "FlyStudio",
"display_name": "FlyStudio",
"target": null
},
{
"id": "Zeus",
"display_name": "Zeus",
"target": null
}
],
"attack_ids": [],
"industries": [
"Finance",
"Technology",
"Telecommunications",
"Media"
],
"TLP": "green",
"cloned_from": "66df393713f4563dfd4c973d",
"export_count": 13,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": true,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 114,
"FileHash-SHA1": 146,
"FileHash-SHA256": 260,
"URL": 64,
"domain": 493,
"email": 36,
"hostname": 545
},
"indicator_count": 1658,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 111,
"modified_text": "72 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6776d3a8bad5e5591b90c296",
"name": "Auto-generated Pulse",
"description": "Pulse generated from indicators file",
"modified": "2025-02-01T17:05:58.066000",
"created": "2025-01-02T17:58:00.076000",
"tags": [
"auto-generated security"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 41,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "AlessandroFiori",
"id": "91912",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 148318,
"hostname": 357
},
"indicator_count": 148675,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 417,
"modified_text": "82 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "63b9efaee5cf4323b68fde7a",
"name": "2023-01-23 | T-Mobile SMS Phishing Campaign",
"description": "Spam SMS text sent at 0200 Eastern with spoofed phone number. Ownership of the phone number is unknown to any US-based Telecom. WHIOS records suggest the domain is parked and privacy-registered in the US. WHOIS records at the time of analysis show that the domain is for sale and approximately 10 years old. The IP is owned by Sedo Gmbh and geolocated to Germany. Domain was registered with Name.com, Inc. URI in hostile domain is a 6-char alphanumeric string. The URI TTP likely suggests this is the same threat actor responsible for earlier campaigns. However, this is a low confidence assessment without additional indicators. This domain shares an IP with numerous other websites making activity and adjacent hostile infrastructure difficult to track. Assuming the threat actor is the same from prior campaigns, this demonstrates their willingness to deviate from Domain-Generation Algorithms (DGA) to succeed in their campaigns.",
"modified": "2024-11-21T20:51:31.007000",
"created": "2023-01-07T22:18:22.107000",
"tags": [
"SMS",
"Spam",
"Phishing",
"Sedo Gmbh",
"Name.com, Inc",
"Germany",
"US",
"MalwareMorghulis",
"Texting",
"Double Helix"
],
"references": [
"https://whois.domaintools.com/kswinwin.com",
"https://securitytrails.com/domain/kswinwin.com/dns",
"https://securitytrails.com/list/ip/91.195.240.94"
],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Germany"
],
"malware_families": [],
"attack_ids": [
{
"id": "T1192",
"name": "Spearphishing Link",
"display_name": "T1192 - Spearphishing Link"
},
{
"id": "T1454",
"name": "Malicious SMS Message",
"display_name": "T1454 - Malicious SMS Message"
},
{
"id": "T1483",
"name": "Domain Generation Algorithms",
"display_name": "T1483 - Domain Generation Algorithms"
}
],
"industries": [
"Telecommunications"
],
"TLP": "green",
"cloned_from": null,
"export_count": 12,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "MalwareMorghulis",
"id": "202965",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_202965/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"hostname": 1,
"URL": 1,
"domain": 1
},
"indicator_count": 3,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 48,
"modified_text": "154 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66ad229b8d28f906a37991f2",
"name": "amii[.]ca",
"description": "Compromised: one of Canada\u2019s three centres of AI excellence as part of the Pan-Canadian AI Strategy\n\nImpact in Business\nWe\u2019ve invested in advanced AI research for decades. Now, we\u2019re here to steer your company to the best path forward to adopt these breakthroughs.\n\nWe partner with companies of all sizes, across industries, to drive innovation strategy and provide practical guidance and advice, corporate training and talent recruitment services. The true potential of AI is unlocked when you build internal capabilities, and that\u2019s where we excel.",
"modified": "2024-10-15T14:49:05.330000",
"created": "2024-08-02T18:16:59.312000",
"tags": [
"UAlberta"
],
"references": [
"https://www.virustotal.com/graph/embed/g9ce2c9fcce4e40cd86c9dad48fafd8a4b2295f789a8c47c5bab33543389ec78d?theme=dark",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/summary",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/iocs",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/graph",
"https://tria.ge/240802-w2gz4azcpc/behavioral1",
"https://www.virustotal.com/graph/embed/g731708921ce14aa8bbffb548afa0d3485ede2d0513b24395a238c28c12bf540b?theme=dark",
"https://dnstwist.it/#d4ef489c-8d0c-4b09-81da-1ec3a95a9687",
"https://www.amii.ca/about/"
],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Canada"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Technology",
"Education",
""
],
"TLP": "white",
"cloned_from": null,
"export_count": 15,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "Disable_Duck",
"id": "244325",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 3731,
"hostname": 1735,
"URL": 2090,
"FileHash-MD5": 95,
"FileHash-SHA1": 95,
"FileHash-SHA256": 1818,
"CVE": 54
},
"indicator_count": 9618,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 76,
"modified_text": "191 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66df393713f4563dfd4c973d",
"name": "IOC-2019-2020",
"description": "IOC collected in 2019-2020, including confirmed and suspected IOC.\nAlso including whitelisted IOC since seen as part of the infrastructure\n\nThese IOC were observed as a highly likely related set of IOC with overt and assumed covert interrelations.",
"modified": "2024-10-09T17:03:47.104000",
"created": "2024-09-09T18:06:47.031000",
"tags": [
"ipv4address",
"domain",
"hash",
"dnsname",
"url http",
"sslcertificate",
"emailaddress",
"url https",
"pattern url",
"domain xn"
],
"references": [
"https://www.virustotal.com/graph/embed/g8248c00b8fb747cbac22a9eafe2538c76d3f073c1a40477397f15304692dbbd0?theme=dark"
],
"public": 1,
"adversary": "assumed part of the emotet distribution network and communication infrastructure",
"targeted_countries": [],
"malware_families": [
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "FlyStudio",
"display_name": "FlyStudio",
"target": null
},
{
"id": "Zeus",
"display_name": "Zeus",
"target": null
}
],
"attack_ids": [],
"industries": [
"Finance",
"Technology",
"Telecommunications",
"Media"
],
"TLP": "green",
"cloned_from": null,
"export_count": 5,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": true,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "commandline",
"id": "76515",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 114,
"FileHash-SHA1": 146,
"FileHash-SHA256": 260,
"URL": 64,
"domain": 493,
"email": 36,
"hostname": 545
},
"indicator_count": 1658,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 52,
"modified_text": "197 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66db086f078a8f724bd6b0f4",
"name": "zygote",
"description": "",
"modified": "2024-10-06T13:01:21.527000",
"created": "2024-09-06T13:49:35.280000",
"tags": [
"virustotal"
],
"references": [
"https://www.virustotal.com/graph/g231c6ec6643844bab5b7afa263c7a54d8f6030f677ab422ab634f35bbd1ab468"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 1,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 16,
"FileHash-SHA1": 17,
"FileHash-SHA256": 198,
"URL": 38,
"domain": 18,
"hostname": 50
},
"indicator_count": 337,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 111,
"modified_text": "200 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66d86e0d76778bf1bcb47e5d",
"name": "AS140227 enriched",
"description": "",
"modified": "2024-10-04T12:02:29.356000",
"created": "2024-09-04T14:26:21.356000",
"tags": [
"virustotal"
],
"references": [
"https://www.virustotal.com/graph/g883116b41ba0417e98c7d99988fd2464797fb1fe54054692a35fe49c03255297"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 0,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 15,
"FileHash-SHA1": 15,
"FileHash-SHA256": 1331,
"domain": 4165,
"hostname": 3720,
"URL": 11188,
"CVE": 1
},
"indicator_count": 20435,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 112,
"modified_text": "202 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65b85e73efe2e053366ed972",
"name": "https://www.hallrender.com/attorney/brian-sabey/",
"description": "",
"modified": "2024-09-05T06:21:34.047000",
"created": "2024-01-30T02:26:59.218000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": "658b74ee93a0b0dc9c960cee",
"export_count": 12,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6145,
"URL": 14252,
"hostname": 4778,
"domain": 6809,
"CVE": 3
},
"indicator_count": 32339,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 192,
"modified_text": "231 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66b12ac151024981a9f2ae03",
"name": "treaty8.ca",
"description": "",
"modified": "2024-09-04T19:02:46.359000",
"created": "2024-08-05T19:40:49.038000",
"tags": [
"virustotal"
],
"references": [
"https://www.virustotal.com/graph/g3bb94f9610a64c08ba661387249f1f00c358854e619b4e559e4c6242d4a1ccdc"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 9,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 1,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 9,
"FileHash-SHA1": 9,
"FileHash-SHA256": 105,
"URL": 83,
"domain": 7,
"hostname": 50
},
"indicator_count": 263,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 110,
"modified_text": "232 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "66a376f0a65ed6a2795c6bb6",
"name": "Active: Malicious IoC's from an entity potentially made vulnerable by outage",
"description": "IoC's related to global outage are compiled from various pulses, and reports from other resources resources contributes to Pulse. \nVarious reports point to preexisting issues that I haven't researched yet,",
"modified": "2024-08-25T01:01:58.524000",
"created": "2024-07-26T10:14:08.699000",
"tags": [
"hstr",
"win32mediadrug",
"win324shared",
"win32spigot",
"lowfi",
"yara detections",
"contacted",
"australia",
"united",
"information",
"mozilla",
"trojanclicker",
"trojan",
"capture",
"service",
"next",
"ipv4",
"filehash",
"malware type",
"indicator role",
"title added",
"active related",
"pulses url",
"search",
"type indicator",
"role title",
"added active",
"related pulses",
"indicator",
"iocs",
"scan endpoints",
"all scoreblue",
"create new",
"pdf report",
"pcap",
"stix",
"openioc",
"show",
"keylogger",
"alerts",
"av detections",
"ids detections",
"analysis date",
"file score",
"malicious ids",
"detections dns",
"query",
"dded active",
"worm",
"filehashsha1",
"filehashsha256",
"entries",
"copyright",
"type",
"pulses",
"create c",
"read c",
"delete",
"write",
"default",
"medium",
"create",
"showing",
"dock",
"execution",
"malware",
"copy",
"xport",
"ded active",
"tor role",
"url https",
"filehashmd5",
"nemucod",
"crossrider",
"keylogger",
"snanning_host",
"no entries",
"found",
"vadokrist",
"siendownloader",
"trojan.crypted",
"suspicioussectioname",
"zusy",
"contact"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Australia"
],
"malware_families": [
{
"id": "TrojanDownloader:Win32/Nemucod",
"display_name": "TrojanDownloader:Win32/Nemucod",
"target": "/malware/TrojanDownloader:Win32/Nemucod"
},
{
"id": "Win32/Toolbar.CrossRider.A",
"display_name": "Win32/Toolbar.CrossRider.A",
"target": null
},
{
"id": "TrojanSpy:Win32/Keylogger.BY",
"display_name": "TrojanSpy:Win32/Keylogger.BY",
"target": "/malware/TrojanSpy:Win32/Keylogger.BY"
},
{
"id": "ALF:TrojanDownloader:Win32/Vadokrist.A",
"display_name": "ALF:TrojanDownloader:Win32/Vadokrist.A",
"target": null
},
{
"id": "!#HSTR:SIENDownloader",
"display_name": "!#HSTR:SIENDownloader",
"target": null
},
{
"id": "Trojan.Crypted-6",
"display_name": "Trojan.Crypted-6",
"target": null
},
{
"id": "#Lowfi:SuspiciousSectionName",
"display_name": "#Lowfi:SuspiciousSectionName",
"target": null
},
{
"id": "Win.Trojan.Zusy-9970844-0",
"display_name": "Win.Trojan.Zusy-9970844-0",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1045",
"name": "Software Packing",
"display_name": "T1045 - Software Packing"
},
{
"id": "T1053",
"name": "Scheduled Task/Job",
"display_name": "T1053 - Scheduled Task/Job"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1119",
"name": "Automated Collection",
"display_name": "T1119 - Automated Collection"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1143",
"name": "Hidden Window",
"display_name": "T1143 - Hidden Window"
},
{
"id": "T1158",
"name": "Hidden Files and Directories",
"display_name": "T1158 - Hidden Files and Directories"
},
{
"id": "T1498",
"name": "Network Denial of Service",
"display_name": "T1498 - Network Denial of Service"
},
{
"id": "T1518",
"name": "Software Discovery",
"display_name": "T1518 - Software Discovery"
},
{
"id": "T1553",
"name": "Subvert Trust Controls",
"display_name": "T1553 - Subvert Trust Controls"
},
{
"id": "T1568",
"name": "Dynamic Resolution",
"display_name": "T1568 - Dynamic Resolution"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
}
],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 53,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 4111,
"FileHash-SHA1": 3998,
"FileHash-SHA256": 5421,
"CVE": 1,
"hostname": 21,
"domain": 5,
"URL": 14
},
"indicator_count": 13571,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 195,
"modified_text": "243 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f0e02dddd69720fad3dfb7",
"name": "LCIA:HoneyNet:2024",
"description": "Louisiana Cyber Investigators Alliance (LCIA): HoneyPot Suricata Log: 2024 A unified coordinated group of federal, state, local law enforcement, as well as LA ESF-17 members, focused onsafeguarding Louisiana's networks through collaborative vigilance and thorough investigations http://www.la-safe.org",
"modified": "2024-08-24T20:03:49.146000",
"created": "2024-03-12T23:07:25.225000",
"tags": [
"tsec",
"tpot19",
"honeypot",
"la-safe.org"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 27,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dm_lacia",
"id": "132921",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 222,
"modified_text": "243 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "669fe6da45da96d68183475f",
"name": "Malware Analysis - Rhadamanthys - Bar Magnezi [0xMrMagnezi]",
"description": "I was able to extract the next stage of Rhadamanthys malware using the tools of CyberChef and Wireshark, as part of a series of analysis and data analysis.",
"modified": "2024-08-22T17:00:02.649000",
"created": "2024-07-23T17:22:34.014000",
"tags": [
"sandworm",
"powershell",
"Rhadamanthys",
"russia"
],
"references": [
"https://0xmrmagnezi.github.io/malware%20analysis/Rhadamanthys/"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "Background Rhadamanthys",
"display_name": "Background Rhadamanthys",
"target": null
}
],
"attack_ids": [
{
"id": "T1125",
"name": "Video Capture",
"display_name": "T1125 - Video Capture"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1104",
"name": "Multi-Stage Channels",
"display_name": "T1104 - Multi-Stage Channels"
},
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
}
],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 11,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "hiroki",
"id": "4606",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 5,
"domain": 3
},
"indicator_count": 8,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 90,
"modified_text": "245 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6683aae863ba601bac1a28b5",
"name": "Zombie.A \u2022 Bayrob in fake malware information website.",
"description": "Incredibly malicious IoC's found in a legitimate appearing website with informative information. Prominently appears at top of targets search results. \n https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png\nMultiple government domains behind website. Honeypot?",
"modified": "2024-08-01T06:03:26.298000",
"created": "2024-07-02T07:23:20.582000",
"tags": [
"ukraine",
"referrer",
"deploys fake",
"uue files",
"fsociety",
"target colombia",
"judiciary",
"financial",
"public",
"tools",
"sector",
"mexico",
"aka xloader",
"html",
"html info",
"title",
"meta tags",
"google tag",
"utc gnr5gzhd545",
"utc na",
"utc aw944900006",
"utc linkedin",
"formbook",
"accept",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers",
"apache",
"so funny",
"click",
"urls",
"passive dns",
"http",
"unique",
"scan endpoints",
"all octoseek",
"url http",
"ip address",
"related nids",
"code",
"united",
"as54113",
"unknown",
"aaaa",
"as15169 google",
"as46691",
"status",
"cname",
"search",
"whitelisted",
"body",
"date",
"msil",
"meta",
"third-party-cookies",
"iframes",
"external-resources",
"text/html",
"trackers",
"end game",
"name servers",
"select contact",
"domain holder",
"nexus category",
"creation date",
"showing",
"date hash",
"avast avg",
"trojan",
"mtb may",
"dynamicloader",
"high",
"medium",
"yara detections",
"sniffs",
"attempts",
"alternate data",
"stream",
"a foreign",
"cultureneutral",
"get na",
"show",
"delete c",
"entries",
"cape",
"delete",
"default",
"copy",
"nivdort",
"write",
"trojanspy",
"bayrob",
"malware",
"eagle eyed",
"nonads",
"path max",
"age86400 set",
"cookie",
"script urls",
"type",
"script script",
"win32 exe",
"pe32",
"intel",
"ms windows",
"ms visual",
"win32 dynamic",
"link library",
"win16 ne",
"pe32 compiler",
"exe32",
"compiler",
"vs98",
"contained",
"simplified",
"info compiler",
"products",
"sp6 build",
"header intel",
"name md5",
"language",
"not found",
"rules not",
"mitre",
"info ids",
"found sigma",
"found",
"files not",
"found network",
"getlasterror",
"icons library",
"os2 executable",
"files",
"file type",
"kb file",
"name",
"type name",
"ip detections",
"country",
"gandi sas",
"dynadot",
"enom",
"namecheap",
"dynadot inc",
"namecheap inc",
"dynadot llc",
"domains",
"tucows domains",
"melbourne it",
"historical ssl",
"realteck audio",
"problems",
"lemon duck",
"iocs",
"sneaky server",
"replacement",
"unauthorized",
"windows",
"windir",
"samplepath",
"user",
"process",
"created",
"shell commands",
"windefend",
"created bus",
"tree",
"registry keys",
"reports upgrade",
"keys set",
"upgradestart",
"dword",
"data registry",
"keys deleted",
"reports",
"get http",
"request",
"http requests",
"ip traffic",
"dns resolutions",
"resolutions",
"mitre att",
"defense evasion",
"ta0007 command",
"control ta0011",
"impact ta0034",
"impact ta0040",
"graph",
"bundled files",
"name file",
"contacted ip",
"users",
"number",
"ascii text",
"crlf line",
"database",
"english",
"tue jun",
"installer",
"template",
"tulach",
"rexxfield",
"milesit",
"cp",
"self deleting",
"stuff",
"copying",
"packages found",
"targeting major",
"injects ads",
"into search",
"results",
"overlay",
"text",
"win32 dll",
"javascript",
"db2maestro",
"open ports",
"ipv4",
"pulse submit",
"url analysis",
"expiration date",
"hostname",
"next",
"ten process",
"utc facebook",
"utc google",
"title ten",
"blog meta",
"tags",
"elastic blog",
"bing ads",
"as8068",
"certificate",
"otx telemetry",
"ref b",
"record value",
"emails",
"please",
"win32",
"x msedge",
"pulse pulses",
"no data",
"tag count",
"analyzer threat",
"url summary",
"ip summary",
"summary",
"sample",
"samples",
"detection list",
"blacklist",
"cisco umbrella",
"site",
"alexa top",
"safe site",
"mail spammer",
"million",
"malware site",
"phishing site",
"malicious site",
"bank",
"fuery",
"unsafe",
"malicious",
"alexa",
"zbot",
"asn as16625",
"akamai",
"less",
"is2osecurity",
"domain name",
"active",
"as21342",
"domain",
"location israel",
"asn as1680",
"invalid url",
"body html",
"head title",
"title head",
"body h1",
"reference",
"log id",
"gmtn",
"digicert tls",
"rsa sha256",
"tls web",
"full name",
"digicert inc",
"organization",
"district",
"columbia",
"false",
"as20940",
"as16625 akamai",
"as8987 amazon",
"moved",
"as1680 cellcom",
"alerts",
"related pulses",
"guard",
"dynamic",
"reads",
"https link",
"as8075",
"record type",
"ttl value",
"redacted for",
"privacy tech",
"privacy admin",
"postal code",
"stateprovince",
"server",
"email",
"office open",
"ms word",
"document",
"xml document",
"xml spreadsheet",
"email trash",
"rich text",
"pdf tripwire",
"fall",
"whois lookups",
"contact email",
"blind eagle",
"brian sabey"
],
"references": [
"https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png",
"https://otx.alienvault.com/indicator/url/www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-MD5 da9b9e892ced7ec90841d813f6e42339",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA1 48dc18f70b2dfdf554e8247eb9e4a8910e19bd3b",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 215fbe9cf76ccbdde60eaa66538edeecadb844078b4379e66cacb83c7ac05690",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 18f62aec151e9f17c55987f80ed1244d9812895018d2bc931df083fb846a52dc",
"Trojan:Win32/Zombie.A: FileHash-SHA256: 72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
"Trojan:Win32/Zombie.A: FileHash-MD5: 36b71d23ca7553fb9db0730e56e6bf77",
"Trojan:Win32/Zombie.A: FileHash-SHA1: 1fa3519b200cf5078c1c6c7df1cf44cd747c2320",
"Alerts: creates_largekey script_created_process antisandbox_mouse_hook antivm_generic_disk dead_connect",
"Alerts: infostealer_cookies infostealer_keylog persistence_ads suspicious_command_tools anomalous_deletefile",
"IDS Detections: Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin 403 Forbidden",
"Alerts: cape_detected_threat cape_extracted_content",
"TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
"TrojanSpy:Win32/Nivdort.CW: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
"TrojanSpy:Win32/Nivdort.CW: FileHash-MD5\t9d6de961a498f831acb63c95e7b2ff0c",
"Bayrob: FileHash-SHA256 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
"Bayrob: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
"Bayrob: FileHash-MD5 871f1532a8f0f9cf9ec3e82b5da3a120",
"Domains Contacted: bettercaught.net electricstrong.net recordtrouble.net electrictrouble.net recordpresident.net",
"Domains Contacted: electricpresident.net recordcaught.net electriccaught.net streetstrong.net tradestrong.net",
"https://otx.alienvault.com/indicator/file/72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
"trojan.cosmu/xpiro - 960879004e1059a9e7eaca7b95f45ab9baf8f5b905e2714f1c65f92244396758",
"Matches rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
"Malware Behavior Catalog: Defense Evasion OB0006 \u2022 Delayed Execution B0003.003 \u2022 Move File C0063 \u2022 Process Environment Block B0001.019",
"Malware Behavior Catalog: Dynamic Analysis Evasion B0003 \u2022 Create File C0016 \u2022 Create Process C0017 \u2022 Create Thread C0038",
"Malware Behavior Catalog: Operating System OC0008 \u2022 Environment Variable C0034 \u2022 Self Deletion F0007 \u2022 : Tree Anti-Behavioral Analysis",
"Malware Behavior Catalog: System Information Discovery E1082 \u2022 File and Directory Discovery E1083 \u2022 Execution OB0009 \u2022 File System OC0001",
"Malware Behavior Catalog: COMSPEC Environment Variable F0007.001 \u2022 Install Additional Program B0023 \u2022 Delete File C0047 \u2022",
"Malware Behavior Catalog: Tree Anti-Behavioral Analysis: C0017 Create Thread \u2022 C0038 Operating System \u2022 Debugger Detection B0001",
"Malware Behavior Catalog: Get File Attributes C0049 \u2022 Set File Attributes C0050 \u2022 Read File C0051 \u2022 Writes File C0052",
"Malware Behavior Catalog: Tree Anti-Behavioral: Environment Variable C0034 \u2022 Anti-Behavioral Analysis OB0001 \u2022 Process OC0003",
"Bayrob: 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69 ef55e2c918f9678e97037d5505b0c8a3.virus",
"Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
"Matches rule ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
"Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
"Matches rule PROTOCOL-ICMP PING Windows Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP",
"http://Object.prototype.hasOwnProperty.call",
"Tulach! It's been a minute - 114.114.114.114",
"What's going on here judiciary? Karen - cisa.gov? e.final",
"f.search schema.org t.final",
"ACTIVE Emails: IS2OSecurity@hq.dhs.gov \u2022 CISA.GOV Status \u2022 schoolsafety.gov \u2022 power2prevent.gov \u2022 is2osecurity@hq.dhs.gov",
"[https://cisa gov] https://otx.alienvault.com/indicator/ip/92.123.203.73 \u2022 https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
"[cisa gov] https://otx.alienvault.com/indicator/domain/cisa.gov \u2022 [hq.dhs.gov] https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
"[dhs gov] https://otx.alienvault.com/indicator/domain/dhs.gov \u2022 https://otx.alienvault.com/indicator/url/https:%2F%2Fwww.cisa.gov%2Fcybersecurity-advisories%2Fics-advisories.xml",
"Alerts: (cisa gov) ransomware_file_modifications script_created_process antisandbox_mouse_hook antivm_generic_disk infostealer_cookies suspicious_command_tools antidebug_guardpages dynamic_function_loading reads_self stealth_window",
"https://otx.alienvault.com/indicator/domain/asp.net \u2022 https://otx.alienvault.com/indicator/hostname/ts1.mm.bing.net",
"Security Contact Email: 212d0c197dca818es@hq.dhs.gov \u2022ACTIVE Domain Name: DHS.GOV"
],
"public": 1,
"adversary": "Blind Eagle",
"targeted_countries": [
"United States of America",
"Colombia",
"Netherlands",
"Israel"
],
"malware_families": [
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Trojan:Win32/Zombie.A",
"display_name": "Trojan:Win32/Zombie.A",
"target": "/malware/Trojan:Win32/Zombie.A"
},
{
"id": "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn",
"display_name": "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn",
"target": null
},
{
"id": "TrojanSpy:Win32/Nivdort.CW",
"display_name": "TrojanSpy:Win32/Nivdort.CW",
"target": "/malware/TrojanSpy:Win32/Nivdort.CW"
},
{
"id": "Bayrob",
"display_name": "Bayrob",
"target": null
},
{
"id": "trojan.bayrob/lazy",
"display_name": "trojan.bayrob/lazy",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "TA0005",
"name": "Defense Evasion",
"display_name": "TA0005 - Defense Evasion"
},
{
"id": "TA0007",
"name": "Discovery",
"display_name": "TA0007 - Discovery"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "TA0002",
"name": "Execution",
"display_name": "TA0002 - Execution"
},
{
"id": "TA0003",
"name": "Persistence",
"display_name": "TA0003 - Persistence"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "TA0029",
"name": "Privilege Escalation",
"display_name": "TA0029 - Privilege Escalation"
},
{
"id": "TA0004",
"name": "Privilege Escalation",
"display_name": "TA0004 - Privilege Escalation"
},
{
"id": "TA0030",
"name": "Defense Evasion",
"display_name": "TA0030 - Defense Evasion"
},
{
"id": "TA0040",
"name": "Impact",
"display_name": "TA0040 - Impact"
},
{
"id": "TA0034",
"name": "Impact",
"display_name": "TA0034 - Impact"
},
{
"id": "T1486",
"name": "Data Encrypted for Impact",
"display_name": "T1486 - Data Encrypted for Impact"
},
{
"id": "TA0011",
"name": "Command and Control",
"display_name": "TA0011 - Command and Control"
},
{
"id": "TA0037",
"name": "Command and Control",
"display_name": "TA0037 - Command and Control"
},
{
"id": "T1007",
"name": "System Service Discovery",
"display_name": "T1007 - System Service Discovery"
},
{
"id": "T1049",
"name": "System Network Connections Discovery",
"display_name": "T1049 - System Network Connections Discovery"
},
{
"id": "T1055.003",
"name": "Thread Execution Hijacking",
"display_name": "T1055.003 - Thread Execution Hijacking"
},
{
"id": "T1415",
"name": "URL Scheme Hijacking",
"display_name": "T1415 - URL Scheme Hijacking"
},
{
"id": "T1416",
"name": "URI Hijacking",
"display_name": "T1416 - URI Hijacking"
},
{
"id": "T1566",
"name": "Phishing",
"display_name": "T1566 - Phishing"
},
{
"id": "T1056.001",
"name": "Keylogging",
"display_name": "T1056.001 - Keylogging"
}
],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 31,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 1,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 1167,
"FileHash-SHA1": 738,
"FileHash-SHA256": 3074,
"URL": 1018,
"domain": 1639,
"hostname": 973,
"email": 11,
"SSLCertFingerprint": 2
},
"indicator_count": 8622,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 194,
"modified_text": "266 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "668318428080452342a0699d",
"name": "FormBook (MaaS) - Injection",
"description": "Gained access to victims likely non-safeguarded device via PowerPoint document fully infecting victims business devices. \u2206 FormBook malware (AKA xLoader) is classified as a stealer (spyware) and, as its name implies, is known for its form-grabbing techniques to extract data directly from website HTML forms as well as its ability to steal data from keystrokes, browser autofill features, and copy-and-paste clipboards.",
"modified": "2024-07-31T19:00:14.104000",
"created": "2024-07-01T20:57:38.668000",
"tags": [
"search",
"entries",
"show",
"read c",
"showing",
"copy",
"high process",
"injection t1055",
"allocates",
"checks",
"write",
"win32",
"malware",
"win32 exe",
"pe32 executable",
"ms windows",
"intel",
"generic cil",
"executable",
"mono",
"win32 dynamic",
"link library",
"win16 ne",
"assembly common",
"clr version",
"assembly name",
"address",
"assembly",
"rva entry",
"streams size",
"entropy chi2",
"guid",
"blob",
"rticon neutral",
"neutral",
"info header",
"name md5",
"type",
"language",
"contained",
"sha256",
"png rticon",
"type name",
"ip detections",
"country",
"contacted",
"execution",
"namecheap inc",
"namesilo",
"cosmotown",
"cv jogjacamp",
"hong kong",
"juming network",
"webcc",
"domains",
"android",
"win32 dll",
"njrat",
"synapse",
"stealer",
"get http",
"connection",
"windows nt",
"host",
"sdermh request",
"post http",
"request",
"origin http",
"accept",
"win64",
"samplepath",
"file execution",
"process",
"created",
"shell commands",
"c cmd",
"f json",
"k wersvcgroup",
"tree",
"windir",
"sdermh",
"historical ssl",
"runtime-modules",
"detect-debug-environment",
"direct-cpu-clock-access",
"crypto_obfuscator",
"memcommit",
"createsuspended",
"cryptexportkey",
"invalid pointer",
"medium",
"keylogger",
"process hollowing"
],
"references": [
"Formbook \u2022 Stealer\u2022 BCBNFD.exe - FileHash-SHA256 f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"https://www.virustotal.com/gui/file/f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26/detection",
"https://otx.alienvault.com/indicator/file/f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"Yara Detections: ConventionEngine_Term_Users , ConventionEngine_Term_Documents , ConventionEngine_Keyword_Obfuscat , DotNET_Crypto_Obfuscator",
"Alerts: injection_runpe allocates_execute_remote_process injection_modifies_memory allocates_rwx packer_entropy privilege_luid_check terminates_remote_process checks_debugger generates_crypto_key",
"Win32:PWSX-gen\\ [Trj]: FileHash-MD5 183666b988ee12982a774e26adb30ce0",
"Win32:PWSX-gen\\ [Trj]: FileHash-SHA1 27d6f0a6c36d3f198f41485e8d73da19d0569c9e",
"Win32:PWSX-gen\\ [Trj]: FileHash-SHA256 f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"Formbook: FileHash-MD5 ab9077915a4f2f52de634df05b681849",
"Formbook: FileHash-SHA1 0162d8c955aaf0f9f0cd6f7365c5ba514be895c6",
"Formbook: FileHash-SHA256 06c7385ce806a0c86049b99d727503a8e04f06989d9f4f5002cde47efc0b55b7",
"Formbook: FileHash-MD5 3fed8c5a7c3a95c9270d18c304f19655",
"Formbook: FileHash-SHA1 e8e453dd5fd6a37f65889b2c3b289f954bfc3c3b",
"Formbook: FileHash-SHA256 4f5a404fc51da90adc3d3b690924263e64bfbf7c3e9918a949e10aca0f3096d1",
"YARA Signature Match - THOR APT Scanner RULE: SUSP_CryptoObfuscator RULE_SET: Livehunt - Suspicious8 Indicators \ud83c\udff9 \u2022 Florian Roth",
"RULE_TYPE: THOR APT Scanner's rule set only \ud83d\udd28 RULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_CryptoObfuscator \u2022 Florian Roth",
"DESCRIPTION: Detects file obfuscated with CryptoObfuscator RULE_AUTHOR: Florian Roth",
"More information: https://www.nextron-systems.com/notes-on-virustotal-matches/",
"CryptoObfuscator"
],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America"
],
"malware_families": [
{
"id": "Win32:PWSX-gen\\ [Trj]",
"display_name": "Win32:PWSX-gen\\ [Trj]",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "TrojanSpy:MSIL/Formbook",
"display_name": "TrojanSpy:MSIL/Formbook",
"target": "/malware/TrojanSpy:MSIL/Formbook"
}
],
"attack_ids": [
{
"id": "T1045",
"name": "Software Packing",
"display_name": "T1045 - Software Packing"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1547",
"name": "Boot or Logon Autostart Execution",
"display_name": "T1547 - Boot or Logon Autostart Execution"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1056.001",
"name": "Keylogging",
"display_name": "T1056.001 - Keylogging"
},
{
"id": "T1587.001",
"name": "Malware",
"display_name": "T1587.001 - Malware"
},
{
"id": "TA0011",
"name": "Command and Control",
"display_name": "TA0011 - Command and Control"
}
],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 12,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 1,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 153,
"FileHash-SHA1": 136,
"FileHash-SHA256": 462,
"URL": 236,
"hostname": 66,
"domain": 245
},
"indicator_count": 1298,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "267 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "63456c2a30b92337ea1670e0",
"name": "IOC Records Provided by @NextRayAI",
"description": "This IOC report provided and daily updated by NextRay AI Detection & Response Inc.",
"modified": "2024-07-16T20:30:56.084000",
"created": "2022-10-11T13:14:18.676000",
"tags": [
"Nextray",
"cyber security",
"ioc",
"phishing",
"malicious"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Turkey",
"Ukraine",
"Romania",
"Czechia",
"United Kingdom of Great Britain and Northern Ireland",
"Norway",
"Lithuania",
"Estonia",
"Latvia",
"Poland",
"Germany",
"Canada",
"France",
"Denmark"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Defense",
"Industrial",
"Government"
],
"TLP": "white",
"cloned_from": null,
"export_count": 1321,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "NextRay-AI",
"id": "210822",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 493080,
"IPv4": 3458,
"IPv6": 519,
"hostname": 41105,
"URL": 155223,
"CIDR": 5266
},
"indicator_count": 698651,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 261,
"modified_text": "282 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "663b59a5514fcb2c423206b8",
"name": "bountyrummy.net",
"description": "Fount in RagnarLocker ransomware pulse.\nBounty on targeted individual. Identified as malicious via other security vendors. OTX tool not identifying malware, ransomware, encrypted files. \nI have not become familiar with LevelBlue/Labs. I can't give much commentary except: esurance.com, add target command, frontrangek9academy.com seem concerning. Name of target and removed during extraction. Needs further research",
"modified": "2024-06-07T10:00:39.731000",
"created": "2024-05-08T10:53:25.278000",
"tags": [
"united",
"search",
"entries",
"as62597",
"creation date",
"record value",
"dnssec",
"showing",
"aaaa",
"unknown",
"meta",
"ffcdcb",
"france unknown",
"xmlns http",
"date",
"referrer",
"historical ssl",
"apt ip",
"address list",
"ip block",
"formbook",
"dns replication",
"technology",
"subdomains",
"whois lookups",
"certificates",
"first",
"graph summary",
"google",
"record type",
"ttl value",
"data",
"v3 serial",
"number",
"cus ogoogle",
"trust"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 16,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 57,
"domain": 993,
"email": 1,
"hostname": 780,
"URL": 1383,
"FileHash-SHA256": 674,
"FileHash-SHA1": 55,
"CVE": 1
},
"indicator_count": 3944,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "321 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f0e02bf9a7687a4f2f14ed",
"name": "LCIA:HoneyNet:March 2024",
"description": "Louisiana Cyber Investigators Alliance (LCIA): HoneyPot Suricata Log: 2024 A unified coordinated group of federal, state, local law enforcement, as well as LA ESF-17 members, focused onsafeguarding Louisiana's networks through collaborative vigilance and thorough investigations http://www.la-safe.org",
"modified": "2024-04-26T23:00:36.531000",
"created": "2024-03-12T23:07:23.776000",
"tags": [
"tsec",
"tpot19",
"honeypot",
"la-safe.org"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 20,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dm_lacia",
"id": "132921",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 219,
"modified_text": "363 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65fdb9f9ce3f29a6447160e7",
"name": "139.159.146.137",
"description": "",
"modified": "2024-04-21T16:01:18.859000",
"created": "2024-03-22T17:03:53.670000",
"tags": [
"virustotal"
],
"references": [
"https://www.virustotal.com/graph/g74613a5d1c3e47b4932771de3ea7b803f11c7ecb73e94aa89a299fd741b0c16b"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 7,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "skocherhan",
"id": "249290",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 6,
"FileHash-SHA1": 5,
"FileHash-SHA256": 294,
"domain": 940,
"hostname": 838,
"URL": 546
},
"indicator_count": 2629,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 111,
"modified_text": "368 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65eff46bdd371899ca5be7d7",
"name": "CrypterX-gen | Video-lal.com | M. Brian Sabey \u2022 Hall Render | Rexxfield",
"description": "Videolal results. Parked. Owner of domain has subsidiaries including Huge Domains. It's possible for attacker to post a 404 error page, park, post it for sale, malvertize. HoneyPotBot? \n\nFireeye. A bit much. william.ballenthin@fireeye.com\t\ncontain a resource (.rsrc) section moritz.raabe@fireeye.com. Overkill. What would Scooby Doo? Scooby!? \nTarget reports opening her MacBook Pro after it was replaced by Apple. It hadn't been in use. She opened it, surprised it was on, automatically connected to a store wifi (she was home) A worker was typing away in terminal. Fought hacker for recordings app containing Jeffrey Reimers aggressions. She lost. Terrified she murdered her MacBook by drowning & dismemberment. Big mistake. Cloned MacBook. Clicked on links trigger malicious downloads, network & DNS issues.",
"modified": "2024-04-11T04:01:24.166000",
"created": "2024-03-12T06:21:31.484000",
"tags": [
"upatre malware",
"rwi dtools",
"page dow",
"security",
"bitfender",
"yandex",
"malware",
"all octoseek",
"av detections",
"ids detections",
"yara detections",
"alerts",
"file score",
"fireeye",
"injection",
"worm",
"trojan",
"network",
"poster",
"honeybots",
"united",
"unknown",
"win32upatre mar",
"passive dns",
"entries",
"ipv4",
"body",
"artro",
"generic malware",
"formbook",
"tag count",
"threat report",
"ip summary",
"url summary",
"generic",
"hostnames",
"pattern match",
"ascii text",
"png image",
"root ca",
"file",
"authority",
"indicator",
"mitre att",
"ck id",
"class",
"date",
"enterprise",
"hybrid",
"accept",
"general",
"local",
"click",
"strings",
"trident",
"as47846",
"germany unknown",
"as2906 netflix",
"scan endpoints",
"domain",
"urls",
"files",
"trojanspy",
"mozilla",
"dynamicloader",
"medium",
"title",
"ms windows",
"head",
"intel",
"inetsim http",
"delete c",
"show",
"winnt",
"copy",
"powershell",
"write",
"next",
"suspicious",
"shop",
"graph api",
"status",
"join",
"vt community",
"api key",
"xcitium verdict",
"cloud",
"contacted",
"contacted urls",
"ssl certificate",
"referrer",
"historical ssl",
"parent domain",
"apple ios",
"resolutions",
"execution",
"hacktool",
"outbound connection",
"detection list",
"blacklist"
],
"references": [
"http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/ \u2022",
"http://systemforex.de/search/redirect.php?f= | http://it.marksypark.com | dont-delete.hugedomains.com | http://selfsparkcentral.com",
"william.ballenthin@fireeye.com contain a resource (.rsrc) section\tmoritz.raabe@fireeye.com | Pattern match: \"jloup@gzip.org\" & \"fancybox@3.5.7\"",
"FormBook: 104.247.81.53 \u2022 http://www.nimtax.com/k9/,Formbook,Medium,9/9/2019,1/7/2020",
"Win32:CrypterX-gen\\ [Trj] | FileHash-MD5 6878e9896fdd84dcc11c997c9b7330ba",
"Win32:CrypterX-gen\\ [Trj] | FileHash-SHA1 2e586f8db46953532b5e25e07add4dbaeea83a79",
"Win32:CrypterX-gen\\ [Trj] | FileHash-SHA256 00027d11309d55312ae77f32d4ae79671c91f541e577bace7a5a5abde05563ad",
"Win32/Renos: https://otx.alienvault.com/malware/ALF:JASYP:TrojanDownloader:Win32%2FRenos/",
"Other:Malware-gen\\ [Trj] | FileHash-MD5 b5168dab50187b33460201b35b96dea7",
"Other:Malware-gen\\ [Trj] | FileHash-SHA1 68868b3d0115e3d06f5fddb9d2ea6ad54270166c",
"Other:Malware-gen\\ [Trj] | FileHash-SHA256 0000ba467dd40046e240c11251d9db03636d0e7c6f9f96354a46a441c2003143",
"allocates_execute_remote_process \u2022 injection_write_memory \u2022 injection_resumethread \u2022 packer_entropy \u2022 network _icmp \u2022 injection_runpe",
"injection_write_memory_exe \u2022 injection_ntsetcontextthread \u2022 dumped_buffer \u2022 checks_debugger \u2022 generates_crypto_key \u2022 antivm_memory_available",
"CnC IP Addresses: 104.247.81.53 \u2022 185.64.219.6 \u2022 199.191.50.82 \u2022 203.107.45.167 \u2022 91.195.240.94 \u2022 167.235.143.33",
"AA47 More AV Detection Ratio 984 / 1000 IDS Detections Win32.Renos/ArtroMALWARETrojan Checkin M1 Possible Fake AV Checkin Fakealert. AA47 More AV Detection Ratio 984 / 1000 IDS Detections /Trojan Checkin M1 Possible Fake AV Checkin Fakealert.",
"Videolal: 18.119.154.66:80 (endpoint request) \u2022 54.209.32.212 \u2022 http://videolal.com (phishing) \u2022 http://videolal.com/ \u2022 videolal.com \u2022 www.videolal.com \u2022",
"www.videolal.com \u2022 httpvideolal.com \u2022 https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html",
"https://www.hugedomains.com/domain_profile.cfm?d=videolal.com \u2022 https://www.hugedomains.com/domain_profile.cfm?d=videolal.com\"",
"https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html \u2022",
"https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
"https://videolal.com/videos/tsara-brashears-assaulted-by-jeffrey-reimer-metlife-login-retirement.html \u2022 https://videolal.com/css/js/jquery-ui.min.js",
"https://videolal.com/videos/tsara-brashears-dead-by-daylight.html \u2022 https://videolal.com/css/jquery-ui.css \u2022 http://videolal.com/tsara-brashears.html",
"http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/tsara-brashears.html \u2022 http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
"http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
"http://videolal.com/jeffrey-reimer-dpt-sexual-misconduct.html \u2022 http://videolal.com/tsara-brashears.html",
"http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html \u2022 http://videolal.com/the-man-who-built-america-1.html",
"http://videolal.com/the-man-who-built-america-1.html \u2022 http://videolal.com/pinnacol-assurance-assaulted-by-jeffrey-",
"http://videolal.com/jeffrey-reimer-dpt-physical-therapy-assaulted-patient.html \u2022 http://videolal.com/jeff-reimer-",
"http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html \u2022",
"http://videolal.com/jeff-reimer-dpt-buys-assault-victims-silence.html \u2022 http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
"https://otx.alienvault.com/otxapi/indicators/file/screenshot/4998a7eac2a056833d01ee1e60c68c1f83f9ad6cd790ced9511e73cc12780f3c",
"https://otx.alienvault.com/malware/Trojan:Win32%2FCrypterX/",
"\u2192https://otx.alienvault.com/pulse/65eedf74b7bdda41057bef3e",
"\u2192https://otx.alienvault.com/pulse/65ef3723d27863fc33a6b671",
"\u2192https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
"\u2192https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297"
],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America"
],
"malware_families": [
{
"id": "Win32:CrypterX-gen\\ [Trj]",
"display_name": "Win32:CrypterX-gen\\ [Trj]",
"target": null
},
{
"id": "Other:Malware-gen\\ [Trj]",
"display_name": "Other:Malware-gen\\ [Trj]",
"target": null
},
{
"id": "Artro",
"display_name": "Artro",
"target": null
},
{
"id": "Win32.Renos/Artro",
"display_name": "Win32.Renos/Artro",
"target": null
},
{
"id": "Generic",
"display_name": "Generic",
"target": null
},
{
"id": "I-Worm/Bagle.QE",
"display_name": "I-Worm/Bagle.QE",
"target": null
},
{
"id": "Worm.Bagle-44",
"display_name": "Worm.Bagle-44",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "TrojanSpy:Win32/Nivdort.DE",
"display_name": "TrojanSpy:Win32/Nivdort.DE",
"target": "/malware/TrojanSpy:Win32/Nivdort.DE"
},
{
"id": "Win.Trojan.Generic-9897526-0",
"display_name": "Win.Trojan.Generic-9897526-0",
"target": null
},
{
"id": "Win.Trojan.Knigsfot-125",
"display_name": "Win.Trojan.Knigsfot-125",
"target": null
},
{
"id": "ALF:TrojanDownloader:Win32/Vadokrist.A",
"display_name": "ALF:TrojanDownloader:Win32/Vadokrist.A",
"target": null
},
{
"id": "Win.Trojan.Generic-9957168-0",
"display_name": "Win.Trojan.Generic-9957168-0",
"target": null
},
{
"id": "Win.Adware.RelevantKnowledge-9821121-0",
"display_name": "Win.Adware.RelevantKnowledge-9821121-0",
"target": null
},
{
"id": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
"display_name": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "HackTool",
"display_name": "HackTool",
"target": null
}
],
"attack_ids": [
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
},
{
"id": "T1059.007",
"name": "JavaScript",
"display_name": "T1059.007 - JavaScript"
},
{
"id": "T1071.003",
"name": "Mail Protocols",
"display_name": "T1071.003 - Mail Protocols"
},
{
"id": "T1071.001",
"name": "Web Protocols",
"display_name": "T1071.001 - Web Protocols"
},
{
"id": "T1071.004",
"name": "DNS",
"display_name": "T1071.004 - DNS"
},
{
"id": "T1063",
"name": "Security Software Discovery",
"display_name": "T1063 - Security Software Discovery"
}
],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 42,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 1622,
"FileHash-SHA1": 934,
"FileHash-SHA256": 3289,
"URL": 9605,
"domain": 2321,
"hostname": 2411,
"CVE": 1,
"email": 3
},
"indicator_count": 20186,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 192,
"modified_text": "378 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65eedf74b7bdda41057bef3e",
"name": "Source Browse- DNS poisoning \u2022 Device CnC",
"description": "Smear + Fear campaign. Parked domain schemes. Swatting, social engineering, crime staging/framing. Cyber bully, shocking, false online content, posters, porn dumping, injection, CnC devices, master keys, break & enter. Victim becomes the accused. Framing. Ability to close bank accounts, skim, call, text, email collection, redirect phone calls, create botnets, engineer malware, injection,divert tax refunds, divert funds, royalties, mail erase job history, attack, hospital, CnC event, IRS audits, fake documentaries, stalkers, attackers, death threats. MD articulated outcome after being SA'd by their employee they vowed to protect.",
"modified": "2024-04-10T09:00:27.994000",
"created": "2024-03-11T10:39:48.949000",
"tags": [
"iocs",
"all octoseek",
"blacklist https",
"gmbh version",
"legal",
"service privacy",
"general full",
"reverse dns",
"san francisco",
"asn13335",
"cloudflarenet",
"cloudflare",
"domains",
"service privacy",
"modernizr",
"domainpath name",
"migrate",
"phishing",
"url https",
"united",
"line",
"threat",
"paste",
"analyze",
"value",
"z6s3i string",
"a7i string",
"y3i string",
"e0b function",
"x8i string",
"source level",
"threat analyzer",
"urls https",
"domain",
"webzilla",
"cloudflar",
"system",
"hostnames",
"sample",
"security tls",
"ecdheecdsa",
"resource",
"hash",
"windows nt",
"win64",
"khtml",
"gecko",
"veryhigh",
"limited",
"lsalford",
"ocomodo ca",
"cncomodo ecc",
"secure server",
"olet",
"encrypt",
"cnlet",
"identity search",
"group",
"google https",
"expired",
"comodo",
"tls web",
"log id",
"criteria id",
"1663014711",
"summary leaf",
"timestamp entry",
"log operator",
"error",
"name size",
"parent",
"directory",
"displays",
"targets",
"smartfolder",
"frame",
"bookmarks",
"splitcount",
"nib files",
"design",
"boundsstr",
"rows",
"source browser",
"ruby logo",
"license",
"python",
"python software",
"foundation",
"apple inc",
"php logo",
"visit",
"valid",
"no na",
"no no",
"ip security",
"ca id",
"research group",
"cnisrg root",
"mozilla",
"android",
"binrm",
"targetdisk",
"create",
"crlcachedir",
"makefile",
"dstroot",
"keychainssrc",
"srcroot",
"crl cache",
"install",
"ev server",
"authentication",
"subject",
"digicert https",
"sectigo https",
"certificate",
"ca limited",
"salford",
"greater",
"key usage",
"access",
"ca issuers",
"ocsp",
"x509v3 subject",
"lets",
"identifier",
"411260982",
"poison",
"search",
"status page",
"impressum",
"protocol h2",
"main",
"framing",
"geoip",
"as13335",
"centos",
"as32244",
"liquidweb",
"redirect",
"as16509",
"as133618",
"z6s3i y3i",
"as62597",
"france unknown",
"showing",
"link",
"z6s3i",
"date",
"unknown",
"meta",
"sha256",
"google safe",
"browsing",
"hostname",
"samples",
"td td",
"tr tr",
"a td",
"a domains",
"passive dns",
"a th",
"urls",
"as50295 triple",
"triple mirrors",
"contact",
"moved",
"show",
"accept",
"body",
"microsoft",
"e4609l",
"urls http",
"yoa https",
"url http",
"scan endpoints",
"report spam",
"created",
"weeks ago",
"pulse",
"brashears",
"xvideos",
"capture",
"expiration",
"no expiration",
"entries",
"status",
"as58110 ip",
"for privacy",
"aaaa",
"creation date",
"domain name",
"germany unknown",
"bq mar",
"ipv4",
"pulse pulses",
"files",
"artro",
"files domain",
"files related",
"pulses otx",
"pulses",
"tags",
"servers",
"record value",
"body doctype",
"html public",
"macintosh",
"intel mac",
"os x",
"technology",
"dns replication",
"email",
"server",
"registrar abuse",
"dnssec",
"expiration date",
"registrar iana",
"admin country",
"tech country",
"registry admin",
"url text",
"facebook url",
"google url",
"google",
"software",
"asn15169",
"ip https",
"february",
"request chain",
"http",
"referer",
"aes128gcm",
"pragma",
"frankfurt",
"germany",
"asn213250",
"itpsolutions",
"full url",
"software caddy",
"express",
"ubuntu",
"as14061",
"digitaloceanasn",
"address as",
"april",
"facebook",
"march",
"hashes",
"ip address",
"as autonomous",
"fastly",
"packet",
"kb script",
"b script",
"october",
"resource path",
"size",
"type mimetype",
"redirect chain",
"kb image",
"b image",
"cname",
"as32244 liquid",
"trojan",
"high",
"yara rule",
"sniffs",
"windows",
"anomalous file",
"medium",
"guard",
"filehash",
"js user",
"python connection",
"brian sabey",
"smithtech",
"rexxfield",
"connect facebook",
"open",
"emails",
"next",
"ssl certificate",
"contacted",
"whois record",
"referrer",
"historical ssl",
"resolutions",
"execution",
"whois whois",
"contacted urls",
"linkid69157 url",
"formbook",
"spyware",
"generic malware",
"tag count",
"sat jul",
"threat report",
"ip summary",
"url summary",
"summary",
"generic",
"alerts",
"icmp traffic",
"cust exe",
"depot tech",
"office depot",
"tech",
"customer client",
"june",
"copy",
"network_icmp",
"inject-x64.exe",
"tsara brashears",
"apple ios",
"hacktool",
"download",
"malware",
"relic",
"monitoring",
"tofsee",
"https://otx.alienvault.com/pulse/65acace20c18a7d6c5da2e27",
"darklivity",
"hijacker",
"remote attackers",
"cybercrime",
"fear factor",
"criminal gang",
"jeffrey reimer",
"miles it",
"history killer",
"apple",
"apple control",
"sreredrum",
"men",
"man",
"hit"
],
"references": [
"videolal.com [Exploitation for privilege - Turns victim into target then spys, smears, embeds pornography in devices]",
"videolal.com was first found hosted : https://rexxfield.com/ | https://crt.sh/?id=410492573 | https://crt.sh/?id=411260982",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/michael.pbxuser.auto.html",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/project.pbxproj.auto.html",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/roots/",
"https://crt.sh/?q=videolal.com",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/Makefile.auto.html",
"https://opensource.apple.com/source/security_certificates/",
"https://crt.sh/?q=videolal.com",
"https://crt.sh/?graph=410492573&opt=nometadata",
"https://crt.sh/?spkisha256=2c5ef644a15ed2d591aee707a125b2870da480a0bc16d78022a311c93aca5b15",
"Tracey Richter smear included Brashears: http://video-lal.com/video/26kiRlUTTmGzje2/diabolical-women-tracey-richter-s1-e2?cpc=n",
"Tracey Richter smear: video-lal.com/videos/diabolical-sentencing.html",
"Tracey Richter smear: video-lal.com/video/26kiRlUTTmGzje2/diabolical-women-tracey-richter-s1-e2?cpc=n",
"Tracey Richter smear: video-lal.com/video/fbcwPGTSo5lrA7e/tracey-richter-documentary?cpc=no",
"Malware hosting: http://videolan.mirror.triple-it.nl/vlc-android/3.0.4/VLC-Android-3.0.4-ARMv7.apk",
"video-lal.com/videos/sandra-richter-video.html",
"Denver Attorney Frank Azar Smear: video-lal.com/videos/sherryce-emery-frank-azar-&-associates.html",
"Brashears smear: video-lal.com/videos/tsara-brashears-dead-by-daylight.html",
"http://tx-p2p-pull.video-voip.com.dorm.com/Accept-Language",
"Crazy: video-lal.com/videos/michael-roberts.html",
"https://urlscan.io/screenshots/e40cd846-7c34-45a5-9f79-fea139f5b1ee.png",
"http://secure.applegiftcard.com \u2022 199.59.243.224: http://tx-p2p-pull.video-voip.com.dorm.com \u2022 199.59.243.224: http://wpad.dorm.com",
"notonmytrack.info \u2022 http://notonmytrack.info \u2022 https://pochta-rf.ru/track74157857 \u2022 patch-tracker.gnewsense.org \u2022 mysql.snore.co",
"Darren Meade: https://urlscan.io/result/e5f1d6fe-036e-4291-8595-0a33e5dacba5/#behaviour \u2022 alleged partner turned enemy of Michael Roberts",
"http://usb.smithtech.us/projects/downloads/shortcutcreator4u3-setup.exe | smithsthermopadtool.com",
"http://usb.smithtech.us/projects/downloads/shortcutcreator4u3-setup.exe \u2022",
"Unclear given names authentic. Michael Roberts, Darren Mitchell Meade , M. Brian Sabey could be used interchangeably. Black hats w/pseudonyms.",
"Smith tech may refer to Det. Ben Smith. HallRender; a media company, producing nonsensical, albeit convincing evidence of deeply fake content.",
"Possibly false names given by individual involved. Brian Sabey Hall Render | Michael Roberts Rexxfield | Darren Meade former partner of Roberts",
"Responsible reopening Richter case via alleged Detective Ben Smith | Names Below linked to porn spewing Videolan , Videolal, Video-lal (Honeypots?) |",
"http://www.hallrender.com/attorney/brian-sabey |",
"Sabey: https://www.google.com/search?q=tsara+brashears&client=ms-android-tmus-us-rvc3&sca_esv=52c806ab62ec5c59&cs=1&prmd=inv&filter=0&biw=347&bih=710&dpr=2.08#ip=1",
"https://www.hallrender.com/attorney/brian-sabey",
"https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png | www.hallrender.com | rexxfield.com",
"http://usb.smithtech.us \u2022 http://usb.smithtech.us/apps/downloads/NSISPortable.exe \u2022 http://usb.smithtech.us/apps/downloads/xplorer2.lite.portable.exe",
"http://usb.smithtech.us/projects/downloads/\u2022 http://usb.smithtech.us/projects/downloads/psu.exe \u2022 smithsthermopadtool.com",
"servicer.mgid.com \u2022 http://iv-u15.com/imbd-104-\u00e9\u00bb\u2019\u00e5\u00ae\u00ae\u00e3\u201a\u0152\u00e3\u0081\u201e-\u00e5\u00a4\u008f\u00e5\u00b0\u2018\u00e5\u00a5\u00b3-\u00e9\u00bb\u2019\u00e5\u00ae\u00ae\u00e3\u201a\u0152\u00e3\u0081\u201e-blu-ray \u2022 https://load77.exelator.com/pixel.gif",
"brain-portal.net",
"303 Status. Ide redirect from: https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
"https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
"https://otx.alienvault.com/pulse/64cf438a574eae18716e5954",
"https://otx.alienvault.com/pulse/64d018ee4623e8fcd386c2e1",
"https://otx.alienvault.com/pulse/65418472eb20b10ee5510fde",
"https://otx.alienvault.com/pulse/64d65255c80d866add600bac",
"https://otx.alienvault.com/pulse/65204565ac1e8bce4de26df3",
"https://otx.alienvault.com/pulse/64cf438a574eae18716e5954",
"https://otx.alienvault.com/pulse/65a342310ab3d2c69778d608",
"Refuses to remove target from adult content \"tagging\""
],
"public": 1,
"adversary": "[Unnamed group]",
"targeted_countries": [
"Australia",
"United States of America"
],
"malware_families": [
{
"id": "Artro",
"display_name": "Artro",
"target": null
},
{
"id": "Generic",
"display_name": "Generic",
"target": null
},
{
"id": "Win.Malware.Farfli-6824119-0",
"display_name": "Win.Malware.Farfli-6824119-0",
"target": null
},
{
"id": "Win32:TrojanX-Gen[Trj]",
"display_name": "Win32:TrojanX-Gen[Trj]",
"target": null
}
],
"attack_ids": [
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1049",
"name": "System Network Connections Discovery",
"display_name": "T1049 - System Network Connections Discovery"
},
{
"id": "T1113",
"name": "Screen Capture",
"display_name": "T1113 - Screen Capture"
},
{
"id": "T1125",
"name": "Video Capture",
"display_name": "T1125 - Video Capture"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1071.003",
"name": "Mail Protocols",
"display_name": "T1071.003 - Mail Protocols"
},
{
"id": "T1059.007",
"name": "JavaScript",
"display_name": "T1059.007 - JavaScript"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
},
{
"id": "T1071.001",
"name": "Web Protocols",
"display_name": "T1071.001 - Web Protocols"
},
{
"id": "T1071.004",
"name": "DNS",
"display_name": "T1071.004 - DNS"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1059.006",
"name": "Python",
"display_name": "T1059.006 - Python"
},
{
"id": "T1155",
"name": "AppleScript",
"display_name": "T1155 - AppleScript"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1574.006",
"name": "Dynamic Linker Hijacking",
"display_name": "T1574.006 - Dynamic Linker Hijacking"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1036.004",
"name": "Masquerade Task or Service",
"display_name": "T1036.004 - Masquerade Task or Service"
},
{
"id": "T1444",
"name": "Masquerade as Legitimate Application",
"display_name": "T1444 - Masquerade as Legitimate Application"
},
{
"id": "T1566",
"name": "Phishing",
"display_name": "T1566 - Phishing"
},
{
"id": "T1598",
"name": "Phishing for Information",
"display_name": "T1598 - Phishing for Information"
},
{
"id": "T1602.002",
"name": "Network Device Configuration Dump",
"display_name": "T1602.002 - Network Device Configuration Dump"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1031",
"name": "Modify Existing Service",
"display_name": "T1031 - Modify Existing Service"
},
{
"id": "T1156",
"name": "Malicious Shell Modification",
"display_name": "T1156 - Malicious Shell Modification"
},
{
"id": "T1014",
"name": "Rootkit",
"display_name": "T1014 - Rootkit"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
}
],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 45,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 5327,
"domain": 2338,
"hostname": 2434,
"FileHash-MD5": 1210,
"FileHash-SHA1": 721,
"FileHash-SHA256": 2784,
"SSLCertFingerprint": 5,
"CVE": 2,
"URI": 2,
"email": 10,
"CIDR": 3
},
"indicator_count": 14836,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 193,
"modified_text": "379 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f5828f8217ecbe6ce3a89b",
"name": "IOCs Industriales",
"description": "",
"modified": "2024-03-16T11:29:19.302000",
"created": "2024-03-16T11:29:19.302000",
"tags": [
"Nextray",
"cyber security",
"ioc",
"phishing",
"malicious"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Turkey",
"Ukraine",
"Romania",
"Czechia",
"United Kingdom of Great Britain and Northern Ireland",
"Norway",
"Lithuania",
"Estonia",
"Latvia",
"Poland",
"Germany",
"Canada",
"France",
"Denmark"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Defense",
"Industrial",
"Government"
],
"TLP": "white",
"cloned_from": "63456c2a30b92337ea1670e0",
"export_count": 78,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dtatov00",
"id": "256758",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 493080,
"IPv4": 3458,
"IPv6": 519,
"hostname": 41105,
"URL": 155223,
"CIDR": 5266
},
"indicator_count": 698651,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 41,
"modified_text": "404 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f5827a4e23b095e5af5f44",
"name": "IOCs Industriales",
"description": "",
"modified": "2024-03-16T11:28:58.984000",
"created": "2024-03-16T11:28:58.984000",
"tags": [
"Nextray",
"cyber security",
"ioc",
"phishing",
"malicious"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Turkey",
"Ukraine",
"Romania",
"Czechia",
"United Kingdom of Great Britain and Northern Ireland",
"Norway",
"Lithuania",
"Estonia",
"Latvia",
"Poland",
"Germany",
"Canada",
"France",
"Denmark"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Defense",
"Industrial",
"Government"
],
"TLP": "white",
"cloned_from": "63456c2a30b92337ea1670e0",
"export_count": 19,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dtatov00",
"id": "256758",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 493080,
"IPv4": 3458,
"IPv6": 519,
"hostname": 41105,
"URL": 155223,
"CIDR": 5266
},
"indicator_count": 698651,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 40,
"modified_text": "404 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f582700d35b0e7c8dd9df8",
"name": "IOCs Industriales",
"description": "",
"modified": "2024-03-16T11:28:48.062000",
"created": "2024-03-16T11:28:48.062000",
"tags": [
"Nextray",
"cyber security",
"ioc",
"phishing",
"malicious"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Turkey",
"Ukraine",
"Romania",
"Czechia",
"United Kingdom of Great Britain and Northern Ireland",
"Norway",
"Lithuania",
"Estonia",
"Latvia",
"Poland",
"Germany",
"Canada",
"France",
"Denmark"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Defense",
"Industrial",
"Government"
],
"TLP": "white",
"cloned_from": "63456c2a30b92337ea1670e0",
"export_count": 28,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dtatov00",
"id": "256758",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 493080,
"IPv4": 3458,
"IPv6": 519,
"hostname": 41105,
"URL": 155223,
"CIDR": 5266
},
"indicator_count": 698651,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 39,
"modified_text": "404 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65f5823b9d7bc6b422256296",
"name": "IOCs Industriales",
"description": "",
"modified": "2024-03-16T11:27:55.808000",
"created": "2024-03-16T11:27:55.808000",
"tags": [
"Nextray",
"cyber security",
"ioc",
"phishing",
"malicious"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [
"United States of America",
"Turkey",
"Ukraine",
"Romania",
"Czechia",
"United Kingdom of Great Britain and Northern Ireland",
"Norway",
"Lithuania",
"Estonia",
"Latvia",
"Poland",
"Germany",
"Canada",
"France",
"Denmark"
],
"malware_families": [],
"attack_ids": [],
"industries": [
"Defense",
"Industrial",
"Government"
],
"TLP": "white",
"cloned_from": "63456c2a30b92337ea1670e0",
"export_count": 28,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "dtatov00",
"id": "256758",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 493080,
"IPv4": 3458,
"IPv6": 519,
"hostname": 41105,
"URL": 155223,
"CIDR": 5266
},
"indicator_count": 698651,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 36,
"modified_text": "404 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65b2e72867db7b4c24575cf4",
"name": "Webhostbox Cybercriminal Group IOCs and Connections",
"description": "Massive amount of traffic analysis has revealed what seems to be a cyber-crime-as-a-service group faking as many different online services, such as \"Microsoft Support\", \"CashApp Support\", \"Facebook Support\", etc. The group spams comments and takes advantage of free account creation via social media where they proceed to make seemingly convincing web pages that advertise their \"services\" using the business services offered by the social media platforms such as LinkedIn Pages and Facebook Pages among others. The domains are tied to phishing kits, and web servers recorded to have attempted SSH brute forcing. The HTML web servers usually list bold toll free numbers in the HTML header that, when called, lead to a social engineering scam using any-desk for remote desktop access.",
"modified": "2024-02-24T21:03:39.610000",
"created": "2024-01-25T22:56:40.572000",
"tags": [
"identifying",
"as15169 as16509",
"as19871 as22612",
"as9002",
"scams",
"fraud",
"hosting",
"c2",
"anydesk",
"caas",
"typosquatting",
"parked domains",
"business email compromise",
"ssh hijacking"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [
{
"id": "T1566",
"name": "Phishing",
"display_name": "T1566 - Phishing"
},
{
"id": "T1194",
"name": "Spearphishing via Service",
"display_name": "T1194 - Spearphishing via Service"
},
{
"id": "T1585.001",
"name": "Social Media Accounts",
"display_name": "T1585.001 - Social Media Accounts"
},
{
"id": "T1192",
"name": "Spearphishing Link",
"display_name": "T1192 - Spearphishing Link"
},
{
"id": "T1454",
"name": "Malicious SMS Message",
"display_name": "T1454 - Malicious SMS Message"
},
{
"id": "T1442",
"name": "Fake Developer Accounts",
"display_name": "T1442 - Fake Developer Accounts"
},
{
"id": "T1021.001",
"name": "Remote Desktop Protocol",
"display_name": "T1021.001 - Remote Desktop Protocol"
},
{
"id": "T1586",
"name": "Compromise Accounts",
"display_name": "T1586 - Compromise Accounts"
},
{
"id": "T1583.001",
"name": "Domains",
"display_name": "T1583.001 - Domains"
},
{
"id": "T1583.006",
"name": "Web Services",
"display_name": "T1583.006 - Web Services"
},
{
"id": "T1591.002",
"name": "Business Relationships",
"display_name": "T1591.002 - Business Relationships"
},
{
"id": "T1110",
"name": "Brute Force",
"display_name": "T1110 - Brute Force"
},
{
"id": "T1184",
"name": "SSH Hijacking",
"display_name": "T1184 - SSH Hijacking"
}
],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 10,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "euphixey",
"id": "150938",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_150938/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"CIDR": 4,
"hostname": 16199,
"domain": 616,
"URL": 8
},
"indicator_count": 16827,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 25,
"modified_text": "425 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6597f9c7542ffc6fffaecb30",
"name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
"description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
"modified": "2024-02-04T12:05:19.275000",
"created": "2024-01-05T12:44:55.030000",
"tags": [
"ciphersuite",
"delete c",
"search",
"entries",
"united",
"stcalifornia",
"lmenlo park",
"ometa platforms",
"odigicert inc",
"cndigicert sha2",
"copy",
"write",
"unknown",
"no expiration",
"expiration",
"filehashsha256",
"hostname",
"domain",
"ipv4",
"url http",
"url https",
"filehashmd5",
"filehashsha1",
"next",
"iocs",
"pdf report",
"pcap",
"scan endpoints",
"win64",
"stix",
"openioc",
"enter",
"ssl certificate",
"whois record",
"apple ios",
"communicating",
"referrer",
"contacted",
"resolutions",
"threat roundup",
"password",
"networks",
"hacktool",
"crypto",
"twitter",
"june",
"probe",
"ransomware",
"malware",
"tsara brashears",
"botnet campaign",
"january",
"content reputation",
"et"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "Content Reputation",
"display_name": "Content Reputation",
"target": null
},
{
"id": "ET",
"display_name": "ET",
"target": null
}
],
"attack_ids": [
{
"id": "T1060",
"name": "Registry Run Keys / Startup Folder",
"display_name": "T1060 - Registry Run Keys / Startup Folder"
}
],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 14,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 2469,
"FileHash-SHA1": 2295,
"FileHash-SHA256": 4925,
"SSLCertFingerprint": 2,
"URL": 4484,
"domain": 2044,
"hostname": 2375,
"email": 18,
"CVE": 4
},
"indicator_count": 18616,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 192,
"modified_text": "445 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6597fa4d4b5e060fb8a606a8",
"name": "Botnet Campaign",
"description": "",
"modified": "2024-02-04T12:05:19.275000",
"created": "2024-01-05T12:47:09.403000",
"tags": [
"ciphersuite",
"delete c",
"search",
"entries",
"united",
"stcalifornia",
"lmenlo park",
"ometa platforms",
"odigicert inc",
"cndigicert sha2",
"copy",
"write",
"unknown",
"no expiration",
"expiration",
"filehashsha256",
"hostname",
"domain",
"ipv4",
"url http",
"url https",
"filehashmd5",
"filehashsha1",
"next",
"iocs",
"pdf report",
"pcap",
"scan endpoints",
"win64",
"stix",
"openioc",
"enter",
"ssl certificate",
"whois record",
"apple ios",
"communicating",
"referrer",
"contacted",
"resolutions",
"threat roundup",
"password",
"networks",
"hacktool",
"crypto",
"twitter",
"june",
"probe",
"ransomware",
"malware",
"tsara brashears",
"botnet campaign",
"january",
"content reputation",
"et"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "Content Reputation",
"display_name": "Content Reputation",
"target": null
},
{
"id": "ET",
"display_name": "ET",
"target": null
}
],
"attack_ids": [
{
"id": "T1060",
"name": "Registry Run Keys / Startup Folder",
"display_name": "T1060 - Registry Run Keys / Startup Folder"
}
],
"industries": [],
"TLP": "green",
"cloned_from": "6597f9c7542ffc6fffaecb30",
"export_count": 14,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 2469,
"FileHash-SHA1": 2295,
"FileHash-SHA256": 4925,
"SSLCertFingerprint": 2,
"URL": 4484,
"domain": 2044,
"hostname": 2375,
"email": 18,
"CVE": 4
},
"indicator_count": 18616,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "445 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6597fa4da16bd99cc5c02528",
"name": "Botnet Campaign",
"description": "",
"modified": "2024-02-04T12:05:19.275000",
"created": "2024-01-05T12:47:09.406000",
"tags": [
"ciphersuite",
"delete c",
"search",
"entries",
"united",
"stcalifornia",
"lmenlo park",
"ometa platforms",
"odigicert inc",
"cndigicert sha2",
"copy",
"write",
"unknown",
"no expiration",
"expiration",
"filehashsha256",
"hostname",
"domain",
"ipv4",
"url http",
"url https",
"filehashmd5",
"filehashsha1",
"next",
"iocs",
"pdf report",
"pcap",
"scan endpoints",
"win64",
"stix",
"openioc",
"enter",
"ssl certificate",
"whois record",
"apple ios",
"communicating",
"referrer",
"contacted",
"resolutions",
"threat roundup",
"password",
"networks",
"hacktool",
"crypto",
"twitter",
"june",
"probe",
"ransomware",
"malware",
"tsara brashears",
"botnet campaign",
"january",
"content reputation",
"et"
],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "Content Reputation",
"display_name": "Content Reputation",
"target": null
},
{
"id": "ET",
"display_name": "ET",
"target": null
}
],
"attack_ids": [
{
"id": "T1060",
"name": "Registry Run Keys / Startup Folder",
"display_name": "T1060 - Registry Run Keys / Startup Folder"
}
],
"industries": [],
"TLP": "green",
"cloned_from": "6597f9c7542ffc6fffaecb30",
"export_count": 18,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 2469,
"FileHash-SHA1": 2295,
"FileHash-SHA256": 4925,
"SSLCertFingerprint": 2,
"URL": 4484,
"domain": 2044,
"hostname": 2375,
"email": 18,
"CVE": 4
},
"indicator_count": 18616,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "445 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65be8e4a55f5851279c265c8",
"name": "https://www.hallrender.com/attorney/brian-sabey/ Gopher Ransomware ",
"description": "",
"modified": "2024-02-03T19:04:42.251000",
"created": "2024-02-03T19:04:42.251000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": "65b85e73efe2e053366ed972",
"export_count": 8,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6027,
"URL": 13374,
"hostname": 4575,
"domain": 6755,
"CVE": 3
},
"indicator_count": 31086,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 192,
"modified_text": "446 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65b85e7056e146f1416eae32",
"name": "https://www.hallrender.com/attorney/brian-sabey/",
"description": "",
"modified": "2024-01-30T02:26:56.698000",
"created": "2024-01-30T02:26:56.698000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": "658b74ee93a0b0dc9c960cee",
"export_count": 7,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6027,
"URL": 13374,
"hostname": 4575,
"domain": 6755,
"CVE": 3
},
"indicator_count": 31086,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "451 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "658b74ee93a0b0dc9c960cee",
"name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
"description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
"modified": "2024-01-26T00:00:39.927000",
"created": "2023-12-27T00:50:54.481000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 41,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6027,
"URL": 13374,
"hostname": 4575,
"domain": 6755,
"CVE": 3
},
"indicator_count": 31086,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 191,
"modified_text": "455 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "658b74f4a6c53cc8e0f70611",
"name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
"description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
"modified": "2024-01-26T00:00:39.927000",
"created": "2023-12-27T00:51:00.982000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": null,
"export_count": 43,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6027,
"URL": 13374,
"hostname": 4575,
"domain": 6755,
"CVE": 3
},
"indicator_count": 31086,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 193,
"modified_text": "455 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "658ca37e41ea135fa35b8832",
"name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/ ",
"description": "",
"modified": "2024-01-26T00:00:39.927000",
"created": "2023-12-27T22:21:50.409000",
"tags": [
"ioc search",
"new ioc",
"teams api",
"contact",
"threat analyzer",
"threat",
"paste",
"iocs",
"hostnames",
"urls https",
"sample",
"ssl certificate",
"feeds ioc",
"analyze",
"whois record",
"contacted",
"historical ssl",
"resolutions",
"threat roundup",
"referrer",
"contacted urls",
"august",
"execution",
"njrat",
"ransomware",
"gopher",
"formbook",
"whois ssl",
"communicating",
"obz4usfn0 url",
"cfqirgdhj5 url",
"obz4usfn0",
"sfqh4dt74w0 url",
"cfqirgdhj5",
"localappdata",
"temp",
"getprocaddress",
"windir",
"ascii text",
"mitre att",
"file",
"ck id",
"show technique",
"path",
"factory",
"hybrid",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"kb body",
"sha256",
"headers date",
"gmt connection",
"obz4usfn0 http",
"cfqirgdhj5 http",
"bundled",
"dropped",
"putty",
"february",
"july",
"whois whois",
"malware",
"urls",
"post",
"vj87",
"passive dns",
"http",
"unique",
"ukhdaauqaaaaaac",
"screenshot",
"scan endpoints",
"all octoseek",
"code"
],
"references": [
"https://www.hallrender.com/attorney/brian-sabey/",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"business-support.intel.com",
"00000000000.cloudfront.net",
"mobileaccess.intel.com",
"artificial-legal-intelligence.com",
"http://intel.net/.about.html",
"http://medlineplus.gov.https.sci-hub.st",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"http://pl.gov-zaloguj.info",
"http://apple.helptechnicalsupport.com/favicon.ico",
"https://www.journaldev.com/41403/regex"
],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [
{
"id": "NjRAT",
"display_name": "NjRAT",
"target": null
},
{
"id": "FormBook",
"display_name": "FormBook",
"target": null
},
{
"id": "Gopher",
"display_name": "Gopher",
"target": null
},
{
"id": "Ransomware",
"display_name": "Ransomware",
"target": null
},
{
"id": "Ascii Exploit",
"display_name": "Ascii Exploit",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1036",
"name": "Masquerading",
"display_name": "T1036 - Masquerading"
},
{
"id": "T1057",
"name": "Process Discovery",
"display_name": "T1057 - Process Discovery"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1082",
"name": "System Information Discovery",
"display_name": "T1082 - System Information Discovery"
},
{
"id": "T1083",
"name": "File and Directory Discovery",
"display_name": "T1083 - File and Directory Discovery"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1106",
"name": "Native API",
"display_name": "T1106 - Native API"
},
{
"id": "T1129",
"name": "Shared Modules",
"display_name": "T1129 - Shared Modules"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1546",
"name": "Event Triggered Execution",
"display_name": "T1546 - Event Triggered Execution"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
}
],
"industries": [],
"TLP": "white",
"cloned_from": "658b74ee93a0b0dc9c960cee",
"export_count": 38,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"FileHash-MD5": 184,
"FileHash-SHA1": 168,
"FileHash-SHA256": 6027,
"URL": 13374,
"hostname": 4575,
"domain": 6755,
"CVE": 3
},
"indicator_count": 31086,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 194,
"modified_text": "455 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6584b75a2f88d494a87301a4",
"name": "IOCs - 202312212158 - ANIA Threat Feeds - IP Segment 8",
"description": "ANIA Collector - Advanced Network Interactive Analysis Collector - Collected from Internet Storm Center IOCs List",
"modified": "2024-01-20T22:03:52.233000",
"created": "2023-12-21T22:08:26.906000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 26,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "AlessandroFiori",
"id": "91912",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 399,
"modified_text": "460 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657f23b03ea2ec9fe300543d",
"name": "IOCs - 202312162330 - ANIA Threat Feeds - IP Segment 8",
"description": "ANIA Collector - Advanced Network Interactive Analysis Collector - Collected from Internet Storm Center IOCs List",
"modified": "2024-01-16T16:03:46.415000",
"created": "2023-12-17T16:37:04.083000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 22,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "AlessandroFiori",
"id": "91912",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 397,
"modified_text": "464 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657ab025b97f20f31bbfcd70",
"name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
"description": "Alleged attorney defending Jeffrey Scott Reimer DPT. Firm uses every possible tool to destroy, make life unbearable, threaten and cause harm to targets. I don't feel safe. I hope this research helps the next target.\n\nMissouri government is seen throughout. The corruption is mafia deep. There is tracking. In person stalking, theft, identity theft, mail theft, modification of records and services, legitimate death threats,etc.\nOpen records act: Target has made multiple reports to authorities regarding physical assaults, threats, phone hacking, etc. OCA: Reports show a settlement was paid by Brian Sabey in part to help Tsara Brashears discover hacker.\nI've been receiving death threats, followed, property accessed, tampering. Attacking entire family including her children, father and beyond.",
"modified": "2024-01-13T06:01:05.467000",
"created": "2023-12-14T07:35:01.537000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": null,
"export_count": 512,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 199,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657c03432f4f2997c7d3aff4",
"name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
"description": "",
"modified": "2024-01-13T06:01:05.467000",
"created": "2023-12-15T07:41:55.972000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": "657ab025b97f20f31bbfcd70",
"export_count": 508,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 195,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657c045ef15bd06d27da1b08",
"name": "Resource Hijacking by attorney https://hallrender.com/attorney/brian-sabey",
"description": "",
"modified": "2024-01-13T06:01:05.467000",
"created": "2023-12-15T07:46:38.664000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": "657c03432f4f2997c7d3aff4",
"export_count": 508,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 195,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "658dd341d97d04b0253392d4",
"name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
"description": "",
"modified": "2024-01-13T06:01:05.467000",
"created": "2023-12-28T19:57:53.875000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": "657ab025b97f20f31bbfcd70",
"export_count": 522,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 196,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "658ef8c00492cc6bdaa8b605",
"name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch | https://safebae.org",
"description": "",
"modified": "2024-01-13T06:01:05.467000",
"created": "2023-12-29T16:50:08.330000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": "658dd341d97d04b0253392d4",
"export_count": 518,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 199,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "659d6ae800440c0befb47e22",
"name": "BazaLoader affiliates use elaborate infection chains via notable victim interaction",
"description": "",
"modified": "2024-01-13T06:01:05.467000",
"created": "2024-01-09T15:48:56.676000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb",
"whois whois",
"whois parent",
"glupteba",
"setup stub",
"c2ae"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": "657c045ef15bd06d27da1b08",
"export_count": 250,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 2001,
"hostname": 3531,
"URL": 7518,
"FileHash-MD5": 2851,
"FileHash-SHA1": 1622,
"FileHash-SHA256": 5092,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 22652,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 195,
"modified_text": "467 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657aaff046e2083b423a39e2",
"name": "Inmortal Invoke-Mimikatz",
"description": "Attorney defending Jeffrey Scott Reimer DPT. Firm uses every possible tool to destroy, make life uncomfortable, threaten and cause harm to targets.\nPossible masquerading / DBA as attorney with such illegal behavior.\nMay have been hired to harass and...she is reported dead of suicide morning after reporting harassment. Missouri government is seen throughout as if hired by firm. If this is a true law firm , the corruption is mafia deep. \n\nI'm 24/7 followed. Hacked l, etc. \nVery expensive threat and deliver campaign. Verdict: Digital profile completely destroyed. Lives at risk.",
"modified": "2024-01-12T04:02:22.872000",
"created": "2023-12-14T07:34:08.701000",
"tags": [
"ssl certificate",
"whois record",
"contacted",
"historical ssl",
"communicating",
"referrer",
"execution",
"tsara brashears",
"highly targeted",
"njrat",
"ransomware",
"heodo",
"tag count",
"thu aug",
"threat report",
"ip summary",
"url summary",
"summary",
"sample",
"samples",
"detection list",
"malicious url",
"blacklist https",
"united",
"firehol",
"maltiverse",
"cyber threat",
"control server",
"host",
"phishing",
"engineering",
"paypal",
"download",
"malware",
"nanocore rat",
"meterpreter",
"pony",
"facebook",
"stealer",
"redline stealer",
"dnspionage",
"mirai",
"nanocore",
"bradesco",
"emotet",
"cobalt strike",
"bank",
"zeus",
"zbot",
"suppobox",
"generic",
"site",
"cisco umbrella",
"alexa top",
"million",
"reverse dns",
"general full",
"url https",
"resource",
"protocol h2",
"security tls",
"software",
"get h2",
"hash",
"main",
"search live",
"api blog",
"docs pricing",
"december",
"hall render",
"advisory",
"brochure url",
"link url",
"linkedin link",
"facebook link",
"value",
"login",
"variables",
"modernizr",
"lsmeta function",
"lsoldgsqueue",
"de indicators",
"domains",
"hashes",
"copyright",
"gmbh version",
"no data",
"tld count",
"urls",
"count blacklist",
"heur",
"html",
"site top",
"malicious site",
"malware site",
"riskware",
"exploit",
"win64",
"unsafe",
"genkryptik",
"artemis",
"opencandy",
"agent",
"dropper",
"fakealert",
"acint",
"nircmd",
"swrort",
"downldr",
"systweak",
"behav",
"crack",
"tiggre",
"presenoker",
"filetour",
"cleaner",
"conduit",
"wacatac",
"mimikatz",
"redirector",
"deepscan",
"iframe",
"memscan",
"suspicious",
"magazine",
"applicunwnt",
"alexa",
"phish",
"win32.pdf.alien",
"freemake",
"webtoolbar",
"trojanspy",
"label",
"input",
"form",
"button",
"render",
"articles",
"column",
"brian",
"search",
"contact",
"span",
"accept",
"this",
"close",
"district",
"ultimate",
"ip address",
"blacklist",
"covid19",
"phishing chase",
"windows nt",
"khtml",
"gecko",
"veryhigh",
"aes256gcm",
"digicert global",
"g2 tls",
"rsa sha256",
"bypass",
"formbook",
"generic malware",
"cutwail",
"safe site",
"phishing site",
"team",
"tofsee",
"azorult",
"service",
"runescape",
"remcos",
"malicious",
"miner",
"hacktool",
"agenttesla",
"unknown",
"downloader",
"trojan",
"detplock",
"networm",
"cryptinject",
"beach research",
"rms",
"redline",
"brian sabey",
"hallrender.com",
"hallrender.com/attorney/brian-sabey",
"tulach",
"tulach.cc",
"mo.gov",
"safebae.org",
"civicalg.com",
"civicalg",
"passive dns",
"domain",
"registrar",
"scan endpoints",
"all octoseek",
"hostname",
"pulse pulses",
"date",
"next",
"computer",
"company limited",
"first",
"utc submissions",
"submitters",
"gti9158",
"gti9080l",
"gti9128v",
"summary iocs",
"graph community",
"namecheap inc",
"cloudflare",
"com laude",
"ltd dba",
"porkbun llc",
"ii llc",
"csc corporate",
"amazon02",
"google",
"cloudflarenet",
"akamaias",
"innova co",
"indonesia",
"level3",
"china telecom",
"mb setup",
"mb opera",
"mb qimage",
"mb iesettings",
"mb super",
"optimizer",
"premium",
"pattern match",
"file",
"ascii text",
"indicator",
"jpeg image",
"et tor",
"known tor",
"misc attack",
"relayrouter",
"general",
"hybrid",
"local",
"click",
"strings",
"class",
"generator",
"critical",
"error",
"traffic",
"tor known",
"exit",
"node tcp",
"tor relayrouter",
"spammer",
"tor exit",
"threats et",
"node udp",
"adware",
"quasar rat",
"installpack",
"xrat",
"fusioncore",
"union",
"raccoon",
"metastealer",
"xtrat",
"blacklist http",
"url http",
"hijacking",
"information",
"report spam",
"attorney",
"trojanx",
"zpevdo",
"vidar",
"agent tesla",
"nymaim",
"virut",
"occamy",
"iobit",
"sality",
"all search",
"otx octoseek",
"author avatar",
"role title",
"added active",
"related pulses",
"entries",
"indicator role",
"title added",
"active related",
"pulses url",
"pulses",
"ipv4",
"expiration",
"no expiration",
"iocs",
"create new",
"site safe",
"lovgate",
"unruy",
"patcher",
"nsis",
"installcore",
"adload",
"cve201711882",
"sonbokli",
"ubot",
"hsbc",
"uztuby",
"malicious host",
"microsoft",
"psexec",
"brontok",
"startpage",
"keygen",
"fareit",
"secrisk",
"floxif",
"threat roundup",
"c2 raccoon",
"march",
"critical risk",
"apple phone",
"unlocker",
"installer",
"laplasclipper",
"blister",
"june",
"name verdict",
"falcon sandbox",
"malware generic",
"tue dec",
"temp",
"mitre att",
"ck id",
"show technique",
"ck matrix",
"twitter",
"seraph",
"bazaloader",
"media",
"security",
"technology",
"dns replication",
"virustotal",
"win32 exe",
"files",
"detections type",
"name",
"notepad",
"java",
"update checker",
"verisign",
"server",
"asia pacific",
"data",
"whois database",
"registrar abuse",
"apnic whois",
"apnic",
"icann whois",
"nanjing",
"cnnic",
"hackers",
"virus network",
"relacionada",
"cyberstalking",
"excel",
"macros sneaky",
"unauthorized",
"wannacry kill",
"attack",
"core",
"qakbot",
"lumma stealer",
"ransomexx",
"quasar",
"metro",
"copy",
"project",
"cnc server",
"proxy",
"ramnit",
"cl0p",
"inmortal",
"noname057",
"jul jan",
"fri jun",
"tag tag",
"failed_code_integrity_checks",
"python_initiated-connection",
"powershell_create_scheduled",
"creation_of_an_executable_by_an_executable",
"botnetwork",
"c2",
"apple hacking",
"government relations",
"abuse",
"download csv",
"json ip",
"linkid252669",
"adwaresig",
"suspected",
"filerepmalware",
"dapato",
"predator",
"fakeinstaller",
"spyrixkeylogger",
"bitminer",
"loadmoney",
"mediaget",
"softonic",
"encpk",
"qbot",
"kraddare",
"dllinject",
"driverpack",
"genpack",
"offercore",
"vitzo",
"babar",
"http response",
"final url",
"serving ip",
"address",
"status code",
"body length",
"b body",
"sha256",
"headers",
"connection",
"pragma",
"team malware",
"binder",
"pykspa",
"feodo",
"mark",
"bomb"
],
"references": [
"https://hallrender.com/attorney/brian-sabey",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"192.124.249.53:80",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"https://poemhunter.com/tsara-brashears/",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"government.westlaw.com",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"us-west-2.es.amazonaws.com (pslicorp)",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"www.hallrender.com (malware hosting)",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"www.dead-speak.com",
"www42.jhonisdead.com",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"fakecelebporno.com",
"batchcourtexpressservicesqa.westlaw.com",
"batchpublicrecords.westlaw.com",
"apple-aqo.com (1 DNSPod.net)",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.anyxxxtube.net/media/favicon/apple",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"https://www.hallrender.com/attorney/brian-sabey"
],
"public": 1,
"adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"targeted_countries": [],
"malware_families": [
{
"id": "Maltiverse",
"display_name": "Maltiverse",
"target": null
},
{
"id": "WIN32.PDF.Alien",
"display_name": "WIN32.PDF.Alien",
"target": null
},
{
"id": "Freemake",
"display_name": "Freemake",
"target": null
},
{
"id": "Redirector",
"display_name": "Redirector",
"target": null
},
{
"id": "Zbot",
"display_name": "Zbot",
"target": null
},
{
"id": "WebToolbar",
"display_name": "WebToolbar",
"target": null
},
{
"id": "Behav",
"display_name": "Behav",
"target": null
},
{
"id": "TrojanSpy",
"display_name": "TrojanSpy",
"target": null
},
{
"id": "Beach Research",
"display_name": "Beach Research",
"target": null
},
{
"id": "RMS",
"display_name": "RMS",
"target": null
},
{
"id": "RedLine",
"display_name": "RedLine",
"target": null
},
{
"id": "Tulach",
"display_name": "Tulach",
"target": null
},
{
"id": "WIN32.PDF.ALIEN",
"display_name": "WIN32.PDF.ALIEN",
"target": null
},
{
"id": "ZeuS",
"display_name": "ZeuS",
"target": null
},
{
"id": "SuppoBox",
"display_name": "SuppoBox",
"target": null
},
{
"id": "Trojan:Win32/Wacatac",
"display_name": "Trojan:Win32/Wacatac",
"target": "/malware/Trojan:Win32/Wacatac"
},
{
"id": "ALF:Trojan:Win32/FormBook",
"display_name": "ALF:Trojan:Win32/FormBook",
"target": null
},
{
"id": "Emotet",
"display_name": "Emotet",
"target": null
},
{
"id": "njRAT",
"display_name": "njRAT",
"target": null
},
{
"id": "Trojan:Win32/Tiggre",
"display_name": "Trojan:Win32/Tiggre",
"target": "/malware/Trojan:Win32/Tiggre"
},
{
"id": "Invoke-Mimikatz",
"display_name": "Invoke-Mimikatz",
"target": null
},
{
"id": "China Telecom",
"display_name": "China Telecom",
"target": null
},
{
"id": "Mirai",
"display_name": "Mirai",
"target": null
},
{
"id": "Sonbokli",
"display_name": "Sonbokli",
"target": null
},
{
"id": "Ubot",
"display_name": "Ubot",
"target": null
},
{
"id": "HSBC",
"display_name": "HSBC",
"target": null
},
{
"id": "Uztuby",
"display_name": "Uztuby",
"target": null
},
{
"id": "APNIC",
"display_name": "APNIC",
"target": null
},
{
"id": "Cl0p",
"display_name": "Cl0p",
"target": null
},
{
"id": "Inmortal",
"display_name": "Inmortal",
"target": null
},
{
"id": "Domains",
"display_name": "Domains",
"target": null
},
{
"id": "Vitzo",
"display_name": "Vitzo",
"target": null
},
{
"id": "Babar",
"display_name": "Babar",
"target": null
},
{
"id": "Qbot",
"display_name": "Qbot",
"target": null
},
{
"id": "WannaCry Kill Switch",
"display_name": "WannaCry Kill Switch",
"target": null
}
],
"attack_ids": [
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"display_name": "T1027 - Obfuscated Files or Information"
},
{
"id": "T1140",
"name": "Deobfuscate/Decode Files or Information",
"display_name": "T1140 - Deobfuscate/Decode Files or Information"
},
{
"id": "T1041",
"name": "Exfiltration Over C2 Channel",
"display_name": "T1041 - Exfiltration Over C2 Channel"
},
{
"id": "T1059",
"name": "Command and Scripting Interpreter",
"display_name": "T1059 - Command and Scripting Interpreter"
},
{
"id": "T1071",
"name": "Application Layer Protocol",
"display_name": "T1071 - Application Layer Protocol"
},
{
"id": "T1105",
"name": "Ingress Tool Transfer",
"display_name": "T1105 - Ingress Tool Transfer"
},
{
"id": "T1114",
"name": "Email Collection",
"display_name": "T1114 - Email Collection"
},
{
"id": "T1497",
"name": "Virtualization/Sandbox Evasion",
"display_name": "T1497 - Virtualization/Sandbox Evasion"
},
{
"id": "T1012",
"name": "Query Registry",
"display_name": "T1012 - Query Registry"
},
{
"id": "T1043",
"name": "Commonly Used Port",
"display_name": "T1043 - Commonly Used Port"
},
{
"id": "T1055",
"name": "Process Injection",
"display_name": "T1055 - Process Injection"
},
{
"id": "T1056",
"name": "Input Capture",
"display_name": "T1056 - Input Capture"
},
{
"id": "T1068",
"name": "Exploitation for Privilege Escalation",
"display_name": "T1068 - Exploitation for Privilege Escalation"
},
{
"id": "T1112",
"name": "Modify Registry",
"display_name": "T1112 - Modify Registry"
},
{
"id": "T1176",
"name": "Browser Extensions",
"display_name": "T1176 - Browser Extensions"
},
{
"id": "T1179",
"name": "Hooking",
"display_name": "T1179 - Hooking"
},
{
"id": "T1449",
"name": "Exploit SS7 to Redirect Phone Calls/SMS",
"display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
},
{
"id": "T1496",
"name": "Resource Hijacking",
"display_name": "T1496 - Resource Hijacking"
},
{
"id": "T1583",
"name": "Acquire Infrastructure",
"display_name": "T1583 - Acquire Infrastructure"
},
{
"id": "T1100",
"name": "Web Shell",
"display_name": "T1100 - Web Shell"
},
{
"id": "T1560",
"name": "Archive Collected Data",
"display_name": "T1560 - Archive Collected Data"
}
],
"industries": [
"Health"
],
"TLP": "white",
"cloned_from": null,
"export_count": 438,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"domain": 1995,
"hostname": 3222,
"URL": 7178,
"FileHash-MD5": 2749,
"FileHash-SHA1": 1538,
"FileHash-SHA256": 4661,
"CVE": 24,
"email": 9,
"CIDR": 4
},
"indicator_count": 21380,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 196,
"modified_text": "468 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "654aafcb7fb218452f27bd45",
"name": "IOCs - 2023117228 - ANIA Threat Feeds - IP Segment 9",
"description": "ANIA Collector - Advanced Network Interactive Analysis Collector - Collected from Internet Storm Center IOCs List",
"modified": "2023-12-07T21:03:58.759000",
"created": "2023-11-07T21:44:43.776000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 17,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "AlessandroFiori",
"id": "91912",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 399,
"modified_text": "504 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "657099644208c92832a9ae92",
"name": "those ip's JL v2 all suggested ioc's - Data you got \ud83d\ude1c\ud83e\udd37\u200d\u2640\ufe0f",
"description": "",
"modified": "2023-12-06T15:55:15.497000",
"created": "2023-12-06T15:55:15.497000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 6,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "StreamMiningEx",
"id": "262917",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"hostname": 4582,
"FileHash-SHA256": 2374,
"CVE": 5,
"domain": 3456,
"URL": 14212,
"FileHash-MD5": 13,
"FileHash-SHA1": 13
},
"indicator_count": 24655,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 87,
"modified_text": "505 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "65232a40f6b0eebbbed449a3",
"name": "IOCs - 20231081433 - ANIA Threat Feeds - IP Segment 6",
"description": "ANIA Collector - Advanced Network Interactive Analysis Collector - Collected from Internet Storm Center IOCs List",
"modified": "2023-11-07T22:02:18.651000",
"created": "2023-10-08T22:16:32.695000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 19,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "api",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "AlessandroFiori",
"id": "91912",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {},
"indicator_count": 0,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 397,
"modified_text": "534 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": false,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "6544cd0acbcc7626dcd336bb",
"name": "theattorneydirectory.com (Pulse by ellenmmm)",
"description": "",
"modified": "2023-11-03T10:35:54.059000",
"created": "2023-11-03T10:35:54.059000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": "651cfdc4476736e2a1780eb2",
"export_count": 16,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 15,
"hostname": 66,
"domain": 51,
"FileHash-SHA256": 1,
"CVE": 3,
"JA3": 2,
"email": 2
},
"indicator_count": 140,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 190,
"modified_text": "538 days ago ",
"is_modified": false,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "651cfdc4476736e2a1780eb2",
"name": "theattorneydirectory.com",
"description": "",
"modified": "2023-11-03T00:02:34.159000",
"created": "2023-10-04T05:53:08.390000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": null,
"export_count": 20,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "ellenmmm",
"id": "233693",
"avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 15,
"hostname": 66,
"domain": 51,
"FileHash-SHA256": 1,
"CVE": 3,
"JA3": 2,
"email": 2
},
"indicator_count": 140,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 66,
"modified_text": "539 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "653f21d2c96b0905667429f7",
"name": "theattorneydirectory.com",
"description": "",
"modified": "2023-11-03T00:02:34.159000",
"created": "2023-10-30T03:24:02.026000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": "651cfdc4476736e2a1780eb2",
"export_count": 9,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "OctoSeek",
"id": "243548",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 15,
"hostname": 66,
"domain": 51,
"FileHash-SHA256": 1,
"CVE": 3,
"JA3": 2,
"email": 2
},
"indicator_count": 140,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 189,
"modified_text": "539 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
},
{
"id": "653fd4504838cf63014a4589",
"name": "theattorneydirectory.com",
"description": "",
"modified": "2023-11-03T00:02:34.159000",
"created": "2023-10-30T16:05:36.274000",
"tags": [],
"references": [],
"public": 1,
"adversary": "",
"targeted_countries": [],
"malware_families": [],
"attack_ids": [],
"industries": [],
"TLP": "green",
"cloned_from": "653f21d2c96b0905667429f7",
"export_count": 8,
"upvotes_count": 0,
"downvotes_count": 0,
"votes_count": 0,
"locked": false,
"pulse_source": "web",
"validator_count": 0,
"comment_count": 0,
"follower_count": 0,
"vote": 0,
"author": {
"username": "scoreblue",
"id": "254100",
"avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
"is_subscribed": false,
"is_following": false
},
"indicator_type_counts": {
"URL": 15,
"hostname": 66,
"domain": 51,
"FileHash-SHA256": 1,
"CVE": 3,
"JA3": 2,
"email": 2
},
"indicator_count": 140,
"is_author": false,
"is_subscribing": null,
"subscriber_count": 189,
"modified_text": "539 days ago ",
"is_modified": true,
"groups": [],
"in_group": false,
"threat_hunter_scannable": true,
"threat_hunter_has_agents": 1,
"related_indicator_type": "IPv4",
"related_indicator_is_active": 0
}
],
"references": [
"https://www.virustotal.com/graph/g3bb94f9610a64c08ba661387249f1f00c358854e619b4e559e4c6242d4a1ccdc",
"alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
"Malware Behavior Catalog: Tree Anti-Behavioral Analysis: C0017 Create Thread \u2022 C0038 Operating System \u2022 Debugger Detection B0001",
"Other:Malware-gen\\ [Trj] | FileHash-SHA256 0000ba467dd40046e240c11251d9db03636d0e7c6f9f96354a46a441c2003143",
"Tulach! It's been a minute - 114.114.114.114",
"\u2192https://otx.alienvault.com/pulse/65ef3723d27863fc33a6b671",
"www.dead-speak.com",
"Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
"videolal.com [Exploitation for privilege - Turns victim into target then spys, smears, embeds pornography in devices]",
"https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
"https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
"batchcourtexpressservicesqa.westlaw.com",
"mobileaccess.intel.com",
"batchpublicrecords.westlaw.com",
"Malware Behavior Catalog: COMSPEC Environment Variable F0007.001 \u2022 Install Additional Program B0023 \u2022 Delete File C0047 \u2022",
"Trojan:Win32/Zombie.A: FileHash-SHA1: 1fa3519b200cf5078c1c6c7df1cf44cd747c2320",
"web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
"www42.jhonisdead.com",
"YARA Signature Match - THOR APT Scanner RULE: SUSP_CryptoObfuscator RULE_SET: Livehunt - Suspicious8 Indicators \ud83c\udff9 \u2022 Florian Roth",
"\u2192https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/michael.pbxuser.auto.html",
"https://dnstwist.it/#d4ef489c-8d0c-4b09-81da-1ec3a95a9687",
"TrojanSpy:Win32/Nivdort.CW: FileHash-MD5\t9d6de961a498f831acb63c95e7b2ff0c",
"http://systemforex.de/search/redirect.php?f= | http://it.marksypark.com | dont-delete.hugedomains.com | http://selfsparkcentral.com",
"http://tx-p2p-pull.video-voip.com.dorm.com/Accept-Language",
"192.124.249.53:80",
"servicer.mgid.com \u2022 http://iv-u15.com/imbd-104-\u00e9\u00bb\u2019\u00e5\u00ae\u00ae\u00e3\u201a\u0152\u00e3\u0081\u201e-\u00e5\u00a4\u008f\u00e5\u00b0\u2018\u00e5\u00a5\u00b3-\u00e9\u00bb\u2019\u00e5\u00ae\u00ae\u00e3\u201a\u0152\u00e3\u0081\u201e-blu-ray \u2022 https://load77.exelator.com/pixel.gif",
"https://otx.alienvault.com/indicator/url/www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
"https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign, Apple iOS password cracker, libel, straight female)",
"Win32:PWSX-gen\\ [Trj]: FileHash-SHA256 f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"Other:Malware-gen\\ [Trj] | FileHash-SHA1 68868b3d0115e3d06f5fddb9d2ea6ad54270166c",
"https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
"https://videolal.com/videos/tsara-brashears-dead-by-daylight.html \u2022 https://videolal.com/css/jquery-ui.css \u2022 http://videolal.com/tsara-brashears.html",
"https://securitytrails.com/list/ip/91.195.240.94",
"http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html \u2022 http://videolal.com/the-man-who-built-america-1.html",
"Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
"Matches rule PROTOCOL-ICMP PING Windows Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP",
"[dhs gov] https://otx.alienvault.com/indicator/domain/dhs.gov \u2022 https://otx.alienvault.com/indicator/url/https:%2F%2Fwww.cisa.gov%2Fcybersecurity-advisories%2Fics-advisories.xml",
"Malware Behavior Catalog: System Information Discovery E1082 \u2022 File and Directory Discovery E1083 \u2022 Execution OB0009 \u2022 File System OC0001",
"Win32:PWSX-gen\\ [Trj]: FileHash-SHA1 27d6f0a6c36d3f198f41485e8d73da19d0569c9e",
"www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
"34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
"us-west-2.es.amazonaws.com (pslicorp)",
"Malware Behavior Catalog: Operating System OC0008 \u2022 Environment Variable C0034 \u2022 Self Deletion F0007 \u2022 : Tree Anti-Behavioral Analysis",
"Win32:PWSX-gen\\ [Trj]: FileHash-MD5 183666b988ee12982a774e26adb30ce0",
"Formbook: FileHash-MD5 ab9077915a4f2f52de634df05b681849",
"Win32:CrypterX-gen\\ [Trj] | FileHash-MD5 6878e9896fdd84dcc11c997c9b7330ba",
"Formbook: FileHash-SHA256 4f5a404fc51da90adc3d3b690924263e64bfbf7c3e9918a949e10aca0f3096d1",
"Alerts: injection_runpe allocates_execute_remote_process injection_modifies_memory allocates_rwx packer_entropy privilege_luid_check terminates_remote_process checks_debugger generates_crypto_key",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/summary",
"poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
"http://usb.smithtech.us/projects/downloads/\u2022 http://usb.smithtech.us/projects/downloads/psu.exe \u2022 smithsthermopadtool.com",
"brain-portal.net",
"http://usb.smithtech.us/projects/downloads/shortcutcreator4u3-setup.exe | smithsthermopadtool.com",
"Alerts: cape_detected_threat cape_extracted_content",
"https://tria.ge/240802-w2gz4azcpc/behavioral1",
"DESCRIPTION: Detects file obfuscated with CryptoObfuscator RULE_AUTHOR: Florian Roth",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/graph",
"Tracey Richter smear: video-lal.com/video/26kiRlUTTmGzje2/diabolical-women-tracey-richter-s1-e2?cpc=n",
"Alerts: infostealer_cookies infostealer_keylog persistence_ads suspicious_command_tools anomalous_deletefile",
"www.videolal.com \u2022 httpvideolal.com \u2022 https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html",
"https://www.virustotal.com/graph/g883116b41ba0417e98c7d99988fd2464797fb1fe54054692a35fe49c03255297",
"https://otx.alienvault.com/pulse/64cf438a574eae18716e5954",
"Videolal: 18.119.154.66:80 (endpoint request) \u2022 54.209.32.212 \u2022 http://videolal.com (phishing) \u2022 http://videolal.com/ \u2022 videolal.com \u2022 www.videolal.com \u2022",
"business-support.intel.com",
"http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html \u2022",
"Darren Meade: https://urlscan.io/result/e5f1d6fe-036e-4291-8595-0a33e5dacba5/#behaviour \u2022 alleged partner turned enemy of Michael Roberts",
"Malware hosting: http://videolan.mirror.triple-it.nl/vlc-android/3.0.4/VLC-Android-3.0.4-ARMv7.apk",
"Bayrob: FileHash-SHA256 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
"[cisa gov] https://otx.alienvault.com/indicator/domain/cisa.gov \u2022 [hq.dhs.gov] https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
"CryptoObfuscator",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
"\u2192https://otx.alienvault.com/pulse/65eedf74b7bdda41057bef3e",
"https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
"https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
"Domains Contacted: bettercaught.net electricstrong.net recordtrouble.net electrictrouble.net recordpresident.net",
"http://www.hallrender.com/attorney/brian-sabey |",
"Domains Contacted: electricpresident.net recordcaught.net electriccaught.net streetstrong.net tradestrong.net",
"http://apple.helptechnicalsupport.com/favicon.ico",
"Win32/Renos: https://otx.alienvault.com/malware/ALF:JASYP:TrojanDownloader:Win32%2FRenos/",
"Matches rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
"https://www.virustotal.com/graph/g231c6ec6643844bab5b7afa263c7a54d8f6030f677ab422ab634f35bbd1ab468",
"Yara Detections: ConventionEngine_Term_Users , ConventionEngine_Term_Documents , ConventionEngine_Keyword_Obfuscat , DotNET_Crypto_Obfuscator",
"https://otx.alienvault.com/indicator/file/72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
"https://www.anyxxxtube.net/media/favicon/apple",
"Tracey Richter smear: video-lal.com/videos/diabolical-sentencing.html",
"init.ess.apple.com ( Code Script \u2022 MortalK)",
"apple-aqo.com (1 DNSPod.net)",
"[https://cisa gov] https://otx.alienvault.com/indicator/ip/92.123.203.73 \u2022 https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
"Win32:CrypterX-gen\\ [Trj] | FileHash-SHA1 2e586f8db46953532b5e25e07add4dbaeea83a79",
"https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
"https://www.virustotal.com/gui/collection/73bb2abd79733bc142df5a8f1d501741b63d79459a3ba76f987dd79515fd9e51/iocs",
"Malware Behavior Catalog: Dynamic Analysis Evasion B0003 \u2022 Create File C0016 \u2022 Create Process C0017 \u2022 Create Thread C0038",
"https://otx.alienvault.com/malware/Trojan:Win32%2FCrypterX/",
"https://securitytrails.com/domain/kswinwin.com/dns",
"http://usb.smithtech.us \u2022 http://usb.smithtech.us/apps/downloads/NSISPortable.exe \u2022 http://usb.smithtech.us/apps/downloads/xplorer2.lite.portable.exe",
"https://otx.alienvault.com/otxapi/indicators/file/screenshot/4998a7eac2a056833d01ee1e60c68c1f83f9ad6cd790ced9511e73cc12780f3c",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/project.pbxproj.auto.html",
"https://videolal.com/videos/tsara-brashears-assaulted-by-jeffrey-reimer-metlife-login-retirement.html \u2022 https://videolal.com/css/js/jquery-ui.min.js",
"https://crt.sh/?graph=410492573&opt=nometadata",
"Smith tech may refer to Det. Ben Smith. HallRender; a media company, producing nonsensical, albeit convincing evidence of deeply fake content.",
"f.search schema.org t.final",
"http://usb.smithtech.us/projects/downloads/shortcutcreator4u3-setup.exe \u2022",
"http://pl.gov-zaloguj.info",
"william.ballenthin@fireeye.com contain a resource (.rsrc) section\tmoritz.raabe@fireeye.com | Pattern match: \"jloup@gzip.org\" & \"fancybox@3.5.7\"",
"https://crt.sh/?q=videolal.com",
"https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
"https://0xmrmagnezi.github.io/malware%20analysis/Rhadamanthys/",
"http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
"Malware Behavior Catalog: Defense Evasion OB0006 \u2022 Delayed Execution B0003.003 \u2022 Move File C0063 \u2022 Process Environment Block B0001.019",
"https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
"https://otx.alienvault.com/indicator/file/f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png",
"http://videolal.com/the-man-who-built-america-1.html \u2022 http://videolal.com/pinnacol-assurance-assaulted-by-jeffrey-",
"www.hallrender.com (malware hosting)",
"More information: https://www.nextron-systems.com/notes-on-virustotal-matches/",
"114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
"c.oooooooooo.ga (c.apple.com cdn)",
"https://www.amii.ca/about/",
"RULE_TYPE: THOR APT Scanner's rule set only \ud83d\udd28 RULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_CryptoObfuscator \u2022 Florian Roth",
"injection_write_memory_exe \u2022 injection_ntsetcontextthread \u2022 dumped_buffer \u2022 checks_debugger \u2022 generates_crypto_key \u2022 antivm_memory_available",
"https://www.virustotal.com/graph/g30cee2c696374fdb957d8762f05b2a00456690f6ba02486b977124f6202d806d",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA1 48dc18f70b2dfdf554e8247eb9e4a8910e19bd3b",
"hero9780.duckdns.org ( government.westlaw.com/house of mo)",
"https://otx.alienvault.com/pulse/64d65255c80d866add600bac",
"http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
"Denver Attorney Frank Azar Smear: video-lal.com/videos/sherryce-emery-frank-azar-&-associates.html",
"CnC IP Addresses: 104.247.81.53 \u2022 185.64.219.6 \u2022 199.191.50.82 \u2022 203.107.45.167 \u2022 91.195.240.94 \u2022 167.235.143.33",
"Formbook: FileHash-SHA1 e8e453dd5fd6a37f65889b2c3b289f954bfc3c3b",
"https://otx.alienvault.com/pulse/65418472eb20b10ee5510fde",
"https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
"Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
"https://crt.sh/?spkisha256=2c5ef644a15ed2d591aee707a125b2870da480a0bc16d78022a311c93aca5b15",
"Sabey: https://www.google.com/search?q=tsara+brashears&client=ms-android-tmus-us-rvc3&sca_esv=52c806ab62ec5c59&cs=1&prmd=inv&filter=0&biw=347&bih=710&dpr=2.08#ip=1",
"hallrender.com (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
"https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
"Trojan:Win32/Zombie.A: FileHash-SHA256: 72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/security_certificates.xcode/",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/roots/",
"https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
"https://poemhunter.com/tsara-brashears/",
"Crazy: video-lal.com/videos/michael-roberts.html",
"https://www.virustotal.com/graph/embed/g9ce2c9fcce4e40cd86c9dad48fafd8a4b2295f789a8c47c5bab33543389ec78d?theme=dark",
"https://www.virustotal.com/graph/embed/g731708921ce14aa8bbffb548afa0d3485ede2d0513b24395a238c28c12bf540b?theme=dark",
"Alerts: creates_largekey script_created_process antisandbox_mouse_hook antivm_generic_disk dead_connect",
"Malware Behavior Catalog: Tree Anti-Behavioral: Environment Variable C0034 \u2022 Anti-Behavioral Analysis OB0001 \u2022 Process OC0003",
"http://medlineplus.gov.https.sci-hub.st",
"Unclear given names authentic. Michael Roberts, Darren Mitchell Meade , M. Brian Sabey could be used interchangeably. Black hats w/pseudonyms.",
"https://whois.domaintools.com/kswinwin.com",
"https://www.hallrender.com/attorney/brian-sabey/",
"Tracey Richter smear included Brashears: http://video-lal.com/video/26kiRlUTTmGzje2/diabolical-women-tracey-richter-s1-e2?cpc=n",
"303 Status. Ide redirect from: https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
"https://hallrender.com/attorney/brian-sabey",
"Brashears smear: video-lal.com/videos/tsara-brashears-dead-by-daylight.html",
"Alerts: (cisa gov) ransomware_file_modifications script_created_process antisandbox_mouse_hook antivm_generic_disk infostealer_cookies suspicious_command_tools antidebug_guardpages dynamic_function_loading reads_self stealth_window",
"http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
"http://videolal.com/jeff-reimer-dpt-buys-assault-victims-silence.html \u2022 http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
"Formbook: FileHash-SHA1 0162d8c955aaf0f9f0cd6f7365c5ba514be895c6",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 215fbe9cf76ccbdde60eaa66538edeecadb844078b4379e66cacb83c7ac05690",
"https://urlscan.io/screenshots/e40cd846-7c34-45a5-9f79-fea139f5b1ee.png",
"https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
"IDS Detections: Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin 403 Forbidden",
"Malware Behavior Catalog: Get File Attributes C0049 \u2022 Set File Attributes C0050 \u2022 Read File C0051 \u2022 Writes File C0052",
"http://videolal.com/jeffrey-reimer-dpt-sexual-misconduct.html \u2022 http://videolal.com/tsara-brashears.html",
"fakecelebporno.com",
"000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
"https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
"TrojanSpy:Win32/Nivdort.CW: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
"http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4 (Apple access hacktool \u2192init.ess.apple.com/Web0)",
"http://Object.prototype.hasOwnProperty.call",
"TrojanSpy:Win32/Nivdort.CW: FileHash-SHA256\t3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
"https://otx.alienvault.com/pulse/65a342310ab3d2c69778d608",
"https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
"http://secure.applegiftcard.com \u2022 199.59.243.224: http://tx-p2p-pull.video-voip.com.dorm.com \u2022 199.59.243.224: http://wpad.dorm.com",
"\u2192https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
"https://otx.alienvault.com/pulse/65204565ac1e8bce4de26df3",
"https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
"Trojan:Win32/Zombie.A: FileHash-MD5: 36b71d23ca7553fb9db0730e56e6bf77",
"https://opensource.apple.com/source/security_certificates/",
"https://www.journaldev.com/41403/regex",
"Other:Malware-gen\\ [Trj] | FileHash-MD5 b5168dab50187b33460201b35b96dea7",
"notonmytrack.info \u2022 http://notonmytrack.info \u2022 https://pochta-rf.ru/track74157857 \u2022 patch-tracker.gnewsense.org \u2022 mysql.snore.co",
"https://www.virustotal.com/graph/embed/g8248c00b8fb747cbac22a9eafe2538c76d3f073c1a40477397f15304692dbbd0?theme=dark",
"Responsible reopening Richter case via alleged Detective Ben Smith | Names Below linked to porn spewing Videolan , Videolal, Video-lal (Honeypots?) |",
"videolal.com was first found hosted : https://rexxfield.com/ | https://crt.sh/?id=410492573 | https://crt.sh/?id=411260982",
"video-lal.com/videos/sandra-richter-video.html",
"http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/tsara-brashears.html \u2022 http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
"Bayrob: 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69 ef55e2c918f9678e97037d5505b0c8a3.virus",
"vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
"https://www.virustotal.com/graph/g74613a5d1c3e47b4932771de3ea7b803f11c7ecb73e94aa89a299fd741b0c16b",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-MD5 da9b9e892ced7ec90841d813f6e42339",
"Formbook \u2022 Stealer\u2022 BCBNFD.exe - FileHash-SHA256 f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26",
"http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
"trojan.cosmu/xpiro - 960879004e1059a9e7eaca7b95f45ab9baf8f5b905e2714f1c65f92244396758",
"FormBook: 104.247.81.53 \u2022 http://www.nimtax.com/k9/,Formbook,Medium,9/9/2019,1/7/2020",
"https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
"Formbook: FileHash-SHA256 06c7385ce806a0c86049b99d727503a8e04f06989d9f4f5002cde47efc0b55b7",
"http://intel.net/.about.html",
"https://www.hugedomains.com/domain_profile.cfm?d=videolal.com \u2022 https://www.hugedomains.com/domain_profile.cfm?d=videolal.com\"",
"AA47 More AV Detection Ratio 984 / 1000 IDS Detections Win32.Renos/ArtroMALWARETrojan Checkin M1 Possible Fake AV Checkin Fakealert. AA47 More AV Detection Ratio 984 / 1000 IDS Detections /Trojan Checkin M1 Possible Fake AV Checkin Fakealert.",
"https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
"ACTIVE Emails: IS2OSecurity@hq.dhs.gov \u2022 CISA.GOV Status \u2022 schoolsafety.gov \u2022 power2prevent.gov \u2022 is2osecurity@hq.dhs.gov",
"Possibly false names given by individual involved. Brian Sabey Hall Render | Michael Roberts Rexxfield | Darren Meade former partner of Roberts",
"allocates_execute_remote_process \u2022 injection_write_memory \u2022 injection_resumethread \u2022 packer_entropy \u2022 network _icmp \u2022 injection_runpe",
"https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html \u2022",
"safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
"west-sca.duckdns.org",
"https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
"Refuses to remove target from adult content \"tagging\"",
"https://www.virustotal.com/gui/file/f69e4fd7802b9947826db300268eb4a88d14a4a30e5e7617cebe17d1584f6c26/detection",
"Tracey Richter smear: video-lal.com/video/fbcwPGTSo5lrA7e/tracey-richter-documentary?cpc=no",
"What's going on here judiciary? Karen - cisa.gov? e.final",
"https://otx.alienvault.com/indicator/domain/asp.net \u2022 https://otx.alienvault.com/indicator/hostname/ts1.mm.bing.net",
"https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png | www.hallrender.com | rexxfield.com",
"00000000000.cloudfront.net",
"government.westlaw.com",
"http://videolal.com/jeffrey-reimer-dpt-physical-therapy-assaulted-patient.html \u2022 http://videolal.com/jeff-reimer-",
"Bayrob: FileHash-MD5 871f1532a8f0f9cf9ec3e82b5da3a120",
"Bayrob: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
"ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 18f62aec151e9f17c55987f80ed1244d9812895018d2bc931df083fb846a52dc",
"artificial-legal-intelligence.com",
"https://opensource.apple.com/source/security_certificates/security_certificates-2/Makefile.auto.html",
"https://www.hallrender.com/attorney/brian-sabey",
"Matches rule ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
"Security Contact Email: 212d0c197dca818es@hq.dhs.gov \u2022ACTIVE Domain Name: DHS.GOV",
"Win32:CrypterX-gen\\ [Trj] | FileHash-SHA256 00027d11309d55312ae77f32d4ae79671c91f541e577bace7a5a5abde05563ad",
"https://otx.alienvault.com/pulse/64d018ee4623e8fcd386c2e1",
"rp.dudaran2.com [routerlogin.net to safebae.org]",
"https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
"https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
"http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/ \u2022",
"Formbook: FileHash-MD5 3fed8c5a7c3a95c9270d18c304f19655",
"http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)"
],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [
"M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
"[Unnamed group]",
"Blind Eagle",
"assumed part of the emotet distribution network and communication infrastructure"
],
"malware_families": [
"Win32.renos/artro",
"Win.trojan.generic-9957168-0",
"#lowfi:suspicioussectionname",
"Ascii exploit",
"Redline",
"Behav",
"Ubot",
"Webtoolbar",
"Njrat",
"Trojanspy",
"!#hstr:siendownloader",
"Domains",
"Vitzo",
"Suppobox",
"Wannacry kill switch",
"Alf:trojandownloader:win32/vadokrist.a",
"Alf:heraklezeval:trojan:win32/neurevt",
"Ransomware",
"Qbot",
"Bayrob",
"Artro",
"Hacktool",
"Win32.pdf.alien",
"Trojanspy:msil/formbook",
"China telecom",
"Cl0p",
"Redirector",
"Trojandownloader:win32/nemucod",
"Et",
"Freemake",
"Win.malware.farfli-6824119-0",
"Trojanspy:win32/keylogger.by",
"Mirai",
"Flystudio",
"Other:malware-gen\\ [trj]",
"Uztuby",
"Generic",
"Gopher",
"Win.trojan.generic-9897526-0",
"Win.trojan.knigsfot-125",
"Win.adware.relevantknowledge-9821121-0",
"Background rhadamanthys",
"Worm.bagle-44",
"Win32:pwsx-gen\\ [trj]",
"Trojan:win32/wacatac",
"Maltiverse",
"Emotet",
"Trojanspy:win32/nivdort.de",
"Zbot",
"Trojan.bayrob/lazy",
"Trojanspy:win32/nivdort.cw",
"Win32/toolbar.crossrider.a",
"Beach research",
"Sonbokli",
"Alf:jasyp:trojandownloader:win32/quireap!atmn",
"Win32:crypterx-gen\\ [trj]",
"Babar",
"Win.trojan.zusy-9970844-0",
"Trojan.crypted-6",
"Apnic",
"I-worm/bagle.qe",
"Zeus",
"Content reputation",
"Alf:trojan:win32/formbook",
"Trojan:win32/zombie.a",
"Hsbc",
"Inmortal",
"Invoke-mimikatz",
"Trojan:win32/tiggre",
"Formbook",
"Rms",
"Win32:trojanx-gen[trj]",
"Tulach"
],
"industries": [
"",
"Industrial",
"Government",
"Finance",
"Health",
"Technology",
"Education",
"Media",
"Telecommunications",
"Defense"
]
}
}
},
"false_positive": [],
"validation": [],
"asn": "AS47846 sedo",
"city_data": true,
"city": null,
"region": null,
"continent_code": "EU",
"country_code3": "DEU",
"country_code2": "DE",
"subdivision": null,
"latitude": 51.2993,
"postal_code": null,
"longitude": 9.491,
"accuracy_radius": 200,
"country_code": "DE",
"country_name": "Germany",
"dma_code": 0,
"charset": 0,
"area_code": 0,
"flag_url": "/assets/images/flags/de.png",
"flag_title": "Germany",
"sections": [
"general",
"geo",
"reputation",
"url_list",
"passive_dns",
"malware",
"nids_list",
"http_scans"
]
}