<?xml version="1.0" encoding="utf-8" ?>
<!-- Generated by MPE 0.6.1 on 02/28/2024 -->
<stix:STIX_Package 
	xmlns:FileObj="http://cybox.mitre.org/objects#FileObject-2"
	xmlns:AddressObj="http://cybox.mitre.org/objects#AddressObject-2"
	xmlns:cyboxVocabs="http://cybox.mitre.org/default_vocabularies-2"
	xmlns:DomainNameObj="http://cybox.mitre.org/objects#DomainNameObject-1"
	xmlns:EmailMessageObj="http://cybox.mitre.org/objects#EmailMessageObject-2"
	xmlns:stixVocabs="http://stix.mitre.org/default_vocabularies-1"
	xmlns:TOUMarking="http://data-marking.mitre.org/extensions/MarkingStructure#Terms_Of_Use-1"
	xmlns:tlpMarking="http://data-marking.mitre.org/extensions/MarkingStructure#TLP-1"
	xmlns:cyboxCommon="http://cybox.mitre.org/common-2"
	xmlns:ttp="http://stix.mitre.org/TTP-1"
	xmlns:marking="http://data-marking.mitre.org/Marking-1"
	xmlns:stixCommon="http://stix.mitre.org/common-1"
	xmlns:stix="http://stix.mitre.org/stix-1"
	xmlns:indicator="http://stix.mitre.org/Indicator-2"
	xmlns:cybox="http://cybox.mitre.org/cybox-2"
	xmlns:CISA="http://www.us-cert.gov/nccic"
	xmlns:xlink="http://www.w3.org/1999/xlink"
	xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
	xmlns:xs="http://www.w3.org/2001/XMLSchema"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	
	xsi:schemaLocation="http://cybox.mitre.org/objects#FileObject-2 http://cybox.mitre.org/XMLSchema/objects/File/2.1/File_Object.xsd
	http://cybox.mitre.org/objects#AddressObject-2 http://cybox.mitre.org/XMLSchema/objects/Address/2.1/Address_Object.xsd
	http://cybox.mitre.org/default_vocabularies-2 http://cybox.mitre.org/XMLSchema/default_vocabularies/2.1/cybox_default_vocabularies.xsd
	http://cybox.mitre.org/objects#DomainNameObject-1 http://cybox.mitre.org/XMLSchema/objects/Domain_Name/1.0/Domain_Name_Object.xsd
	http://cybox.mitre.org/objects#EmailMessageObject-2 http://cybox.mitre.org/XMLSchema/objects/Email_Message/2.1/Email_Message_Object.xsd
	http://stix.mitre.org/default_vocabularies-1 http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd
	http://data-marking.mitre.org/extensions/MarkingStructure#Terms_Of_Use-1 http://stix.mitre.org/XMLSchema/extensions/marking/terms_of_use/1.1/terms_of_use_marking.xsd
	http://data-marking.mitre.org/extensions/MarkingStructure#TLP-1 http://stix.mitre.org/XMLSchema/extensions/marking/tlp/1.2/tlp_marking.xsd
	http://cybox.mitre.org/common-2 http://cybox.mitre.org/XMLSchema/common/2.1/cybox_common.xsd
	http://stix.mitre.org/TTP-1 http://stix.mitre.org/XMLSchema/ttp/1.2/ttp.xsd
	http://data-marking.mitre.org/Marking-1 http://stix.mitre.org/XMLSchema/data_marking/1.2/data_marking.xsd
	http://stix.mitre.org/common-1 http://stix.mitre.org/XMLSchema/common/1.2/stix_common.xsd
	http://stix.mitre.org/stix-1 http://stix.mitre.org/XMLSchema/core/1.2/stix_core.xsd
	http://stix.mitre.org/Indicator-2 http://stix.mitre.org/XMLSchema/indicator/2.2/indicator.xsd
	http://cybox.mitre.org/cybox-2 http://cybox.mitre.org/XMLSchema/core/2.1/cybox_core.xsd" id="NPG-16845046" version="1.1.1" timestamp="2024-02-28T22:05:57">
    <stix:STIX_Header>
        <stix:Title>AA24-060A #StopRansomware Phobos Ransomware</stix:Title>
        <stix:Package_Intent xsi:type="stixVocabs:PackageIntentVocab-1.0">Indicators</stix:Package_Intent>
        <stix:Description>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA, to disseminate known TTPs and IOCs associated with the Phobos ransomware variants observed as recently as February 2024, according to open source reporting. Phobos is structured as a ransomware-as-a-service (RaaS) model. Since May 2019, Phobos ransomware incidents impacting state, local, tribal, and territorial (SLTT) governments have been regularly reported to the MS-ISAC. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S. dollars.

The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of Phobos ransomware and other ransomware incidents.</stix:Description>
        <stix:Handling>
            <marking:Marking>
                <marking:Controlled_Structure>//node() | //@*</marking:Controlled_Structure>
                <marking:Marking_Structure xsi:type='TOUMarking:TermsOfUseMarkingStructureType'>
                    <TOUMarking:Terms_Of_Use>DISCLAIMER: This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise. This document is distributed as TLP:WHITE: Disclosure is not limited. For more information on the Traffic Light Protocol, see https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage.</TOUMarking:Terms_Of_Use>
                </marking:Marking_Structure>
                <marking:Marking_Structure xsi:type='tlpMarking:TLPMarkingStructureType' color="WHITE"/>
            </marking:Marking>
        </stix:Handling>
        <stix:Information_Source>
            <stixCommon:Time>
                <cyboxCommon:Produced_Time>2024-02-29T00:00:00Z</cyboxCommon:Produced_Time>
            </stixCommon:Time>
        </stix:Information_Source>
    </stix:STIX_Header>
    <stix:Indicators>
        <stix:Indicator id="CISA:Indicator-851a9313-2e84-4b04-8b6a-2968702dcd38" timestamp="2024-02-28T22:05:57.211111+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-eae75ec9-1c83-486b-803f-ac0ef329d320">
                <cybox:Object id="CISA:Object-369daa6e-dc4d-4e15-8f3d-c804cd748552">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">1570442295</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">0900B61FEBED8DA43708F6735ED6C11B</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">90B2CEBBEB377480E321D8F38EA6DE2FA661E437</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">7451BE9B65B956EE667081E1141531514B1EC348E7081B5A9CD1308A98EEC8F0</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">3072:omlcfKKkQybVuof03Vo7NLLDzqgFsvz+io254PAQ243/q6WvMt/9eYikt9BfoQ:ogcfKKkQybVuof03Vo7NPDzPWvz+iEo7</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-7de48974-083d-4ff6-a2b3-386758824a9f" timestamp="2024-02-28T22:05:57.213326+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-1ca8a7c3-3d6e-4c59-9b8f-170188660a94">
                <cybox:Object id="CISA:Object-487d9e4c-626b-4140-9454-71144d4f69a7">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">Ahpdate.exe</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">20D9FA474FA2628A6ABE5485D35EE7E0</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">A28AF73BCFD4EBE2FE29242C07FEC15E0578EC8A</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">0000599CBC6E5B0633C5A6261C79E4D3D81005C77845C6B0679D854884A8E02F</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">12288:mm0+bjvfBp6pOcQmqtPxGKw3genar9XW6Y:Awn6UcQmEPx2wem9XWf</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ce6a6add-1f47-473a-8dc8-1d30f4ad7d75" timestamp="2024-02-28T22:05:57.214022+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-8a181946-5b0b-42e2-97ae-1ca55331b562">
                <cybox:Object id="CISA:Object-de9c428f-dd40-4c4a-a5eb-e99ea063ed1d">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">carljohnson1948@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-1bd64737-ee50-4d97-ba59-05962b092a8f" timestamp="2024-02-28T22:05:57.214507+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-c30136cd-113f-4159-bc5b-e9c1722a21aa">
                <cybox:Object id="CISA:Object-65e5e03a-2336-44f9-867a-dc8b0aecd69c">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">zodiacx@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-f522c969-981d-47a4-98fd-64ae0b0110e4" timestamp="2024-02-28T22:05:57.214899+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-a66e0f20-b958-477f-83d3-5cd28e53f839">
                <cybox:Object id="CISA:Object-e6428218-0cf7-4b4c-9bd6-9c6802bf80ae">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helpforyou@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c59aff50-f2ba-4a1b-892d-1d8407501408" timestamp="2024-02-28T22:05:57.215286+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-83be919b-97bf-4c22-be6a-d4049d328c64">
                <cybox:Object id="CISA:Object-89008855-bd33-4e8b-9fb6-5742d099223d">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">zgen@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c3a46f97-d31b-45a1-9fe1-212c446dd9b4" timestamp="2024-02-28T22:05:57.215703+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-dce422d5-7fee-4159-bea4-fc67b72aef1f">
                <cybox:Object id="CISA:Object-7beffa58-c306-4d10-8c30-0f37266188f7">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helpforyou@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-d8387f7d-f588-4288-926b-6b054edbd26e" timestamp="2024-02-28T22:05:57.216086+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-0ac4ee65-dbc4-4508-acca-f6774276fcb1">
                <cybox:Object id="CISA:Object-c0f5de5d-c8aa-41b8-bf76-7c7aa4550129">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">xspacegroup@protonmail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-4b2c825c-63c6-47da-ba00-302178e421ed" timestamp="2024-02-28T22:05:57.216586+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-7682c8a4-89a1-4e96-aaa2-13a21f479bf5">
                <cybox:Object id="CISA:Object-e27835f0-34dd-4614-a8f8-3671ce6e494d">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helpfiles102030@inboxhub.net</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-cb991968-58af-43c7-be71-315fcf289e61" timestamp="2024-02-28T22:05:57.216988+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-c66999a2-6caa-45e9-bcf5-725046a2a8a6">
                <cybox:Object id="CISA:Object-72accd32-15e8-45d0-b7d2-858e778f47aa">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">xgen@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-2fde83fb-de6c-42d7-ac3e-ff8508647df0" timestamp="2024-02-28T22:05:57.217373+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-bbe7a944-1884-4075-acd9-94e2214b0970">
                <cybox:Object id="CISA:Object-928f0db8-17f6-4434-919f-361fd6789787">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">xdone@tutamail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-6fd93b9a-39cf-4a0d-ae8b-e3929aaff03c" timestamp="2024-02-28T22:05:57.217789+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-0e813bf6-92d2-465e-8ab2-8758c8fc8235">
                <cybox:Object id="CISA:Object-939dd583-03e4-40b5-98f5-e343e793a25a">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">starcomp@keemail.me</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-cee4e664-ae73-4482-9a51-bf243eecb588" timestamp="2024-02-28T22:05:57.218170+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-9253fa0d-7d26-453e-ac8f-1adcfb7ccf83">
                <cybox:Object id="CISA:Object-3baff4cc-cfba-4812-8a77-4b925e2a7773">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helperfiles@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c5776b8c-da93-4d4b-8bbf-9f092270afd7" timestamp="2024-02-28T22:05:57.218574+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-3a9c2509-2ffb-4a06-9f0a-ee407a462af4">
                <cybox:Object id="CISA:Object-8a41530b-cb70-40c8-921b-45ae07259600">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">stafordpalin@protonmail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-fb6217af-109c-4297-ac35-766093088387" timestamp="2024-02-28T22:05:57.218951+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-9d37357c-8d80-4805-800d-2b41ced156c9">
                <cybox:Object id="CISA:Object-787e87fc-bd2f-4596-9539-5c4870e165cb">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">greenbookbtc@protonmail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-35ca1f18-2c9b-47b2-8391-c42783389a38" timestamp="2024-02-28T22:05:57.219329+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-8ff560ce-4414-4276-940d-5275abb1c102">
                <cybox:Object id="CISA:Object-087ed156-71b9-437f-9451-69208ccf0974">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">spacegroup@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-2f23cebb-764c-40e9-857e-a0c9a1fd0bd3" timestamp="2024-02-28T22:05:57.219735+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-3155c45f-e450-4de0-bbc4-29a7f0abd729">
                <cybox:Object id="CISA:Object-4f777762-985c-4c80-adb1-6330b2b8bdf7">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">greenbookbtc@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-539bb95b-b304-495a-8868-741113035e30" timestamp="2024-02-28T22:05:57.220117+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-8813de26-1440-4bec-91a3-10cb1551395e">
                <cybox:Object id="CISA:Object-3f1e0ba8-699e-4152-a111-df8f6b17c0ce">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">sory@countermail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-179bee36-62eb-4e02-9e25-c0776304271e" timestamp="2024-02-28T22:05:57.220526+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-3dc00313-168e-4150-8489-d5ba0916d0f2">
                <cybox:Object id="CISA:Object-db7b157c-f30e-438f-98a4-7dd54f9fbaf8">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">getdata@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-db9d44c1-a9d5-4b88-af74-7e41cbbca41e" timestamp="2024-02-28T22:05:57.220983+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-430d0d0d-faf8-4239-b12c-416f2c8d88db">
                <cybox:Object id="CISA:Object-d79c91ad-252c-4476-9133-2487e7897f96">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">skymix@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-23d3b67b-4822-42ff-a797-3c1a76418c9a" timestamp="2024-02-28T22:05:57.221369+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-3d60325f-0a5d-4f42-a62e-8a8bd72e2127">
                <cybox:Object id="CISA:Object-b17e3cd6-e8ab-4598-aea1-bc55e4532178">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">fredmoneco@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ba438cfc-be18-423f-a30c-823289646e7f" timestamp="2024-02-28T22:05:57.221782+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-6a2eee57-8030-4dff-85d7-8fd48424f78c">
                <cybox:Object id="CISA:Object-a871c5d7-59dd-458a-9f4d-52c6777e1cc5">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">secdatltd@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-62e32396-e06e-4247-8ecf-b1cf4a39107c" timestamp="2024-02-28T22:05:57.222164+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-0adba209-dab2-479e-8bb4-23b271b7c2be">
                <cybox:Object id="CISA:Object-f9ac1165-7dd9-4e4e-aa73-bde8772d69a6">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">fquatela@techie.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-b937bc6e-1d63-4895-a70e-8c4766f61821" timestamp="2024-02-28T22:05:57.222571+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-48254c22-7f7d-4cc5-8f3b-19cef1808f8f">
                <cybox:Object id="CISA:Object-ea910dfd-5310-4c45-b823-8ded37a4cfd3">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">saraconor@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-a7301bdb-5326-446d-bfd7-159e260925f4" timestamp="2024-02-28T22:05:57.222948+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-aca7e853-a894-4247-bed1-9bfb1a98da18">
                <cybox:Object id="CISA:Object-49a469c4-f6b4-480b-a9ba-2597efc47516">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">fastway@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-d1bc9680-6ef1-41ba-a0a7-b4ba1256d7bd" timestamp="2024-02-28T22:05:57.223322+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-6d222754-4166-4632-a8a1-8fc38ddae8bb">
                <cybox:Object id="CISA:Object-4fc182d7-1b41-481f-89eb-7dd0c70dc2e4">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">samuelwhite1821@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-e8b0ebfd-71d8-48bc-a05d-fe953441d1d7" timestamp="2024-02-28T22:05:57.223730+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-157ba778-a4b1-44a0-8db1-dc5dbd5c0646">
                <cybox:Object id="CISA:Object-7c89c69f-f59a-4c58-a1ae-cfe24aa19e40">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">expertbox@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ebdfa64e-c8a3-40dc-a467-a2b8e3af2efe" timestamp="2024-02-28T22:05:57.224104+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-310a9faf-a026-4631-8e3c-457a0c1e082d">
                <cybox:Object id="CISA:Object-cceda960-a16f-4571-957e-fdfe4e1f9198">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">recovery2021@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-a56d4b4c-eed0-46d9-8c87-fff3cb4af387" timestamp="2024-02-28T22:05:57.224508+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-2fd2c190-3162-4cea-8bb3-bd5d8765dc76">
                <cybox:Object id="CISA:Object-e715d6f7-2bd8-462f-92a2-944d3a4583bc">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">everymoment@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-0b6689fa-f565-48a8-a6a1-c9f847345ca0" timestamp="2024-02-28T22:05:57.224963+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-53524d15-9e19-47b9-aad5-9c96725edaef">
                <cybox:Object id="CISA:Object-55336386-61b6-4382-9812-06639a92a0b7">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">recovery2021@inboxhub.net</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-233c2e55-f7bf-4800-9843-2ef24363f382" timestamp="2024-02-28T22:05:57.225347+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-02a3915b-9ed1-48b1-969c-0a1aca035aac">
                <cybox:Object id="CISA:Object-9213f40d-29bd-4788-9872-f574f9e319c2">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">crashonlycash@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-47166808-5315-4abf-bb1b-c119363c438d" timestamp="2024-02-28T22:05:57.225760+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-d077b87c-3628-47de-ac73-81b282c9adec">
                <cybox:Object id="CISA:Object-c4675e78-d227-40cf-8234-625fb9bdf16a">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">precorpman@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-b2677f38-4cb2-473d-9f02-bb7675876cfe" timestamp="2024-02-28T22:05:57.226142+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-ce9db80d-0f63-44d2-9b69-61acf08e9e6d">
                <cybox:Object id="CISA:Object-4ab0e85b-d791-4940-8927-60cae3f2f5c7">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">cox.barthel@aol.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ee216bce-30a0-40df-a2d7-b754b96c18a4" timestamp="2024-02-28T22:05:57.226549+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-3f4af59d-0523-4d91-933f-13155f9cd555">
                <cybox:Object id="CISA:Object-31d6004f-b4c3-43cd-9be8-9c249f2dc2f2">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">please@countermail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-bcf3bda2-c29f-415b-9bbe-0a877458ca48" timestamp="2024-02-28T22:05:57.226929+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-6e2d724e-392e-41f3-981b-a62d86f75313">
                <cybox:Object id="CISA:Object-e600020c-9c4a-482b-9490-5a3a258ad6aa">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">colexpro@keemail.me</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ab6fe450-0970-4a68-9c3f-2e7ac0da4057" timestamp="2024-02-28T22:05:57.227306+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-e7799a4e-3574-4a50-98b1-aca8e8785b6f">
                <cybox:Object id="CISA:Object-fb1d25bf-dbcd-4e5e-ae5c-b1a028acc597">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">nud_satanakia@keemail.me</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-73f2caa4-ac22-4bd1-8a9f-18128cbe2d3e" timestamp="2024-02-28T22:05:57.227740+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-274658ef-1282-4892-8a46-4325513f1f72">
                <cybox:Object id="CISA:Object-23f60796-9816-4fda-a9e0-7f1be506798a">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">clausmeyer070@cock.li</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-bfaa66b7-f1ae-430e-b364-4fb0106c1b83" timestamp="2024-02-28T22:05:57.228131+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-88f90756-8aae-48f4-b063-3d1c9238fccb">
                <cybox:Object id="CISA:Object-3eda5de2-e26a-4d25-8a2a-f479d37a45a2">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">normanbaker1929@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-7fd27aa3-1dd0-4139-9afa-d7d021c1eb5f" timestamp="2024-02-28T22:05:57.228556+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-ac7613fd-6c8d-4699-af38-af6792657a7c">
                <cybox:Object id="CISA:Object-4b818782-7843-4623-89e7-9fef9e30fcba">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">claredrinkall@aol.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-39edcbd4-1cbd-4fed-aa00-f17871e672e4" timestamp="2024-02-28T22:05:57.229044+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-116d2311-e946-4a70-a5f9-df0d8e410a67">
                <cybox:Object id="CISA:Object-e115d765-5431-43b9-b157-82a20bdc7114">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">michaelwayne1973@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-38f85687-a15b-4780-bdbd-edef3b1b98f2" timestamp="2024-02-28T22:05:57.229466+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-e05b55cd-9d0d-472d-88a2-21f9c8035fed">
                <cybox:Object id="CISA:Object-caaf18c0-9d18-45ee-85d0-345f4f8e98d9">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">chocolate_muffin@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-3123eae7-a930-4b9d-af6d-e072c9f56b66" timestamp="2024-02-28T22:05:57.229899+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-07a714f8-24c8-4cca-ac8c-409f4b6b27cb">
                <cybox:Object id="CISA:Object-3b38b0da-d13b-4d2c-8ae5-53aa85168c58">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">miadowson@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-dd9c245a-916c-410e-987f-519a21610376" timestamp="2024-02-28T22:05:57.230291+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-37d88393-e28f-4813-b918-c86f74de5a4e">
                <cybox:Object id="CISA:Object-b1dfcfd7-1575-4278-b827-d82cbf73cf8c">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">cashonlycash@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-5e9ff499-e95c-4c58-86d3-402ae2b880d4" timestamp="2024-02-28T22:05:57.230738+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-d6d16c29-ab4c-4e80-8a3e-60c2386e1bac">
                <cybox:Object id="CISA:Object-103bd678-6502-4234-8500-3fc02bdca8ad">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">megaport@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-03b1fbae-0dc1-4b4c-b573-21c14badd47d" timestamp="2024-02-28T22:05:57.231134+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-37374eb6-9425-4df2-9465-d0280ad1e524">
                <cybox:Object id="CISA:Object-a71ccdef-cb6e-4175-8dfb-83d880eb77f0">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">mccreight.ellery@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-97b47068-23e9-4bc7-8418-fbe84fa22487" timestamp="2024-02-28T22:05:57.231559+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-bcf145ed-ba98-4bff-8f37-2a1391b206c3">
                <cybox:Object id="CISA:Object-d252897c-cfbc-4143-8235-4807691a6f13">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">blair_lockyer@aol.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-df0f370b-637d-4316-80d6-bbce62ab793b" timestamp="2024-02-28T22:05:57.231971+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-7a75b8b3-80a8-4599-bbaa-a19939e4d56a">
                <cybox:Object id="CISA:Object-0a0a7aac-ead0-4448-894d-b215fbe27e74">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">matheuscosta0194@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-27adbf2c-893d-473f-87a8-b3c219922e76" timestamp="2024-02-28T22:05:57.232371+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-8e7c3fb9-023b-46a6-bf9d-65d82f5fc771">
                <cybox:Object id="CISA:Object-4294ee6e-3073-447e-84e9-c3e1a55c3493">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">bill.gteam@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-2d138eea-60d5-435e-bac0-8150214dd683" timestamp="2024-02-28T22:05:57.232821+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-708d5bdd-f6df-41d8-a673-accbfdcaf051">
                <cybox:Object id="CISA:Object-d3cc21c2-3048-4200-b7ff-8119264a8b99">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">luiza.li@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-4d2f7ad4-8ff2-4af5-b1d7-76875b4d684d" timestamp="2024-02-28T22:05:57.233791+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-e52911ca-d3b7-4ebb-bbed-b3a9e4ce6fff">
                <cybox:Object id="CISA:Object-3bd5dfac-3ba9-405d-a6ea-977214d54d62">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">bill.g@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-fa503de2-88cb-463d-acb5-d3522365f9e2" timestamp="2024-02-28T22:05:57.234211+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-eed916a0-40e2-43d5-9aba-1916249115cc">
                <cybox:Object id="CISA:Object-bf3c03a0-a07a-49cb-8295-e94505a9e625">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">lettointago@onionmail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c918e77d-469b-4006-aee9-1eca052196cb" timestamp="2024-02-28T22:05:57.234651+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-c109874c-e6f5-4edb-8db7-1bbf4b8fb23e">
                <cybox:Object id="CISA:Object-7a4b97a0-581d-4270-b34a-1ae7ae6991f9">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">bill.g@msgsafe.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-3a9dec37-e362-4e4c-a936-3573085913e4" timestamp="2024-02-28T22:05:57.235057+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-1b320726-b46a-45cd-96ca-185a2b158f50">
                <cybox:Object id="CISA:Object-314654ae-4161-4395-870b-763b2adf411b">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">joshuabernandead@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-77cecbce-9337-4866-89ab-b7741c417c6e" timestamp="2024-02-28T22:05:57.235457+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-9aed0af4-3d72-4345-84da-483dc2178828">
                <cybox:Object id="CISA:Object-b4a56617-9df7-4059-9a4b-7e40693717ff">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">bill.g@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c89edd63-bf27-4977-922e-dcdde8d45a61" timestamp="2024-02-28T22:05:57.235873+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-7c593560-43f2-4b87-8388-f7adc1cbc9e6">
                <cybox:Object id="CISA:Object-69fdf0eb-5b9e-4164-beda-55e695d49614">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">jonson_eight@gmx.us</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ff3db67c-4c6a-4724-9108-5f26d1a39d24" timestamp="2024-02-28T22:05:57.236276+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-56a1456c-8cdc-47f3-a34e-6a237fa9ae3c">
                <cybox:Object id="CISA:Object-b87bfa80-d95c-4388-bdb6-53bf49dbf0a5">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">bernard.bunyan@aol.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-f730c80d-e453-4738-910d-b2d18ef184d1" timestamp="2024-02-28T22:05:57.236732+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-ffbcbc13-9195-424a-864f-299afd0d86f5">
                <cybox:Object id="CISA:Object-85075ea6-d6c0-47e6-b046-bd3aeb16d291">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">johnwilliams1887@gmx.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-995744a0-6604-498c-9260-568d5e19d410" timestamp="2024-02-28T22:05:57.237130+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-a9649479-4e6f-4cba-a925-adb7553dd4d7">
                <cybox:Object id="CISA:Object-11701621-357c-4af7-9ba3-031ffccdbf49">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">barenuckles@tutanota.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ca42d4bb-18a9-40eb-8626-797d0e9f9bc5" timestamp="2024-02-28T22:05:57.237552+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-888ad84a-4ac2-4ee3-bea0-356770e5d3b3">
                <cybox:Object id="CISA:Object-5435adf5-730a-40a1-aa27-3e953825b474">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">it.issues.solving@outlook.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-10c9358f-a4df-4718-a722-e517b9f104a5" timestamp="2024-02-28T22:05:57.237980+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-f806a407-cee9-4442-969a-34b14b079168">
                <cybox:Object id="CISA:Object-899323ae-8fb5-4e9b-b9ac-d62063cb1496">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">axdus@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-2d6f4a73-599d-4a23-a3b6-106261d27aec" timestamp="2024-02-28T22:05:57.238420+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-e0deec17-23e7-4bf9-9214-355379c337aa">
                <cybox:Object id="CISA:Object-e31efcb0-97b7-4eab-a125-5b5453418d1b">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">info@fobos.one</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-546634c4-455a-4c56-bd92-fe4771375afc" timestamp="2024-02-28T22:05:57.238858+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-c7a7922c-3043-430f-a982-548027dd39b2">
                <cybox:Object id="CISA:Object-10aa704b-4325-4de6-93d1-4562e9546716">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">atomicday@tuta.io</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-c919bf29-8763-4f61-830c-1ba8cbdee1ab" timestamp="2024-02-28T22:05:57.239249+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-ec769270-c93a-4173-85dd-e25238f2d734">
                <cybox:Object id="CISA:Object-b514b7a1-1725-4c12-99a5-144b7b5f25ca">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">henryk@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-91adf3a6-4746-42d6-99bc-dede6dc13f94" timestamp="2024-02-28T22:05:57.239681+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-46ec47b2-23ec-4ed3-80a0-6d365057faa5">
                <cybox:Object id="CISA:Object-2dd2b975-5776-4fff-85c6-2001ab76f46a">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">albetpattisson1981@protonmail.com</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-fbcbc5e6-daae-4e49-9efa-f0894695898d" timestamp="2024-02-28T22:05:57.240138+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-9a5591fd-35a8-46eb-92aa-a8a11108373d">
                <cybox:Object id="CISA:Object-f117bb12-5e54-4f8f-930b-cdea1c6ba303">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">69788B170956A5C58EBD77F7680FDE7C</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">43683751209E85571072D953C0BDD44C883045EE</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">F3BE35F8B8301E39DD3DFFC9325553516A085C12DC15494A5E2FCE73C77069ED</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">768:/vrNNeRBl5JFTXqwXrkgrn/9/HiDKGwRj4RcTdyH4pYT3nPKVU1ExPZXYX5SPXMz:BNeRBl5PT/rx1mzwRMSTdLpJxhXDfxs</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-8f2501f7-e6d7-4050-b223-8c6dc4f4cfd8" timestamp="2024-02-28T22:05:57.240796+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-b952bfdb-e681-4106-8ae9-6915bc5f8905">
                <cybox:Object id="CISA:Object-4510200f-d8f2-4313-8096-bb82fcf33b3b">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">62885D0F106569FAC3985F72F0CA10CB</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">CB37B10B209AB38477D2E17F21CAE12A1CB2ADF0</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">58626A9BFB48CD30ACD0D95DEBCAEFD188AE794E1E0072C5BDE8ADAE9BCCAFA6</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">1536:sNeRBl5PT/rx1mzwRMSTdLpJNr+eiukbsSw:sQRrmzwR5JViums</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-d7d0252d-61e5-4710-b1a6-cccd6d7f786b" timestamp="2024-02-28T22:05:57.241421+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-185c4346-157e-4bb1-9f35-db239776cafc">
                <cybox:Object id="CISA:Object-0d0baf94-3448-4cf8-93fe-0575a3f3b2d2">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">9376F223D363E28054676BB6EF2C3E79</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">AED68CFA282EC2B0F8A681153BEAEBE3A17D04EE</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">2704E269FB5CF9A02070A0EA07D82DC9D87F2CB95E60CB71D6C6D38B01869F66</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">1536:hNeRBl5PT/rx1mzwRMSTdLpJgL0UHg1tuP4ib:hQRrmzwR5JS0UA1Rib</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2019-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-1f4b0994-37c9-40ed-9b07-c38a89027a0a" timestamp="2024-02-28T22:05:57.242084+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-2e9e684d-3893-4116-b8f0-4b3716ded8a7">
                <cybox:Object id="CISA:Object-8977ce22-1eab-475e-8e74-f3f1b9729766">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">B119CDD3D02B60009B9AD39DA799ED3B</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">B092A6BF7FB6755E095ED9F35147D1C6710CF2C4</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">FC4B14250DB7F66107820ECC56026E6BE3E8E0EB2D428719156CF1C53AE139C6</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">1536:fRvoU+XfE9ICf4t1OwruWiyB055fGDlfG:f6X89NfsjruWiydZG</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2019-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-96863896-3dde-4e7e-a2d0-f20845f9488e" timestamp="2024-02-28T22:05:57.242794+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-d7e56f27-2d35-4f2b-b55a-8bec1462be09">
                <cybox:Object id="CISA:Object-9086c5bd-275b-457e-9d7d-a385d1312803">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">32A674B59C3F9A45EFDE48368B4DE7E0E76C19E06B2F18AFB6638D1A080B2EB3</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2019-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-ae881b4c-8aa9-4641-aebf-945d648f615c" timestamp="2024-02-28T22:05:57.243223+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-1fcf75ab-a0ae-4e9c-8887-b2c13715483b">
                <cybox:Object id="CISA:Object-8b81a047-8da6-49e3-9a71-5b956094ae6a">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">fe2d1879880466e24e76d8d0963feb93.exe</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">FE2D1879880466E24E76D8D0963FEB93</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">18EBB65842CCD3A1D1EEB597F2017267D47DAAF9</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">9215550CE3B164972413A329AB697012E909D543E8AC05D9901095016DD3FC6C</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">6144:YVtrvQVm+214icCgPMmcCs+XhmOi/h/dD2YYWs6+ClKflgjBMf:Y/QVQ1D/Nmfs+XhZodDWWsJClkCj</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2023-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-6982f7e1-8b17-4338-9420-18a976f83566" timestamp="2024-02-28T22:05:57.243897+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-dc3e7a44-42fc-4022-9d71-b177746232be">
                <cybox:Object id="CISA:Object-a7e922b6-77ca-41d6-84b4-ac5f744c916b">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">a567048dd823ff2d395ddd95d1fa5302.exe</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">A567048DD823FF2D395DDD95D1FA5302</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">7332956DEBC4FB14A54D69B0B858BD5B04BECAC1</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">482754D66D01AA3579F007C2B3C3D0591865EB60BA60B9C28C66FE6F4AC53C52</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">24576:Y9mJWeLfEmWZOLJCj4ZYM9UA6/OUO7oNmXKj8okyH7l/meRG:5LfELGUO7oNm6j8okLI</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2023-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-cccaae95-f504-4fdd-ae90-452dbe7fa331" timestamp="2024-02-28T22:05:57.244555+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-5d09231d-8671-402d-9e87-25bf1f85b72c">
                <cybox:Object id="CISA:Object-8f054bf9-e952-4521-88a6-cd350abfd0a1">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">SecuriteInfo.com.Win32.PWSX-gen.218.3876</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">ECDF7ACB35E4268BCAFB03B8AF12F659</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">93B0D892BD3FBB7D3D9EFB69FFFDC060159D4536</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">C0539FD02CA0184925A932A9E926C681DC9C81B5DE4624250F2DD885CA5C4763</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">12288:UzRlcffXwJsWFAFnjJPQJq+6byL3z5SjMa1jkSC9U:ujB0JYcAa1S</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2023-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-3112b5e5-4c4e-4aed-8f62-3216b72b351b" timestamp="2024-02-28T22:05:57.245197+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious FQDN Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Domain Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-3ffb8b1e-409a-4a2a-ae42-32beef6488ce">
                <cybox:Object id="CISA:Object-7654aadd-fa33-4f8d-bed8-35187cec6ab0">
                    <cybox:Properties xsi:type="DomainNameObj:DomainNameObjectType" type="FQDN">
                        <DomainNameObj:Value condition="Equals">adstat477d.xyz</DomainNameObj:Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2022-12-16T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-88422f4d-25dc-4fde-b289-b6d85f3ce025" timestamp="2024-02-28T22:05:57.245599+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious FQDN Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Domain Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-4a383897-0b77-48c4-a8ea-d07234a7b7e0">
                <cybox:Object id="CISA:Object-340c8663-15b7-45a6-a35c-2959ba5368b2">
                    <cybox:Properties xsi:type="DomainNameObj:DomainNameObjectType" type="FQDN">
                        <DomainNameObj:Value condition="Equals">demstat577d.xyz</DomainNameObj:Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2022-12-16T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-a1f34dc7-43d5-4a56-97c5-db757a93ed41" timestamp="2024-02-28T22:05:57.245997+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious FQDN Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Domain Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-b7a757c0-bf05-4a56-8cac-f5c4619c4baa">
                <cybox:Object id="CISA:Object-c9540427-da8d-4d67-acda-caf413f505aa">
                    <cybox:Properties xsi:type="DomainNameObj:DomainNameObjectType" type="FQDN">
                        <DomainNameObj:Value condition="Equals">serverxlogs21.xyz</DomainNameObj:Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2011-06-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-e304d4ae-704e-4a26-9dd1-5709dfe4a7b1" timestamp="2024-02-28T22:05:57.246374+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-ba8f96f6-0667-48bc-a099-6e9db40d517b">
                <cybox:Object id="CISA:Object-ea95657c-8777-4a75-9f12-35d3ad188964">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c; 518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c.exe</FileObj:File_Name>
                        <FileObj:Size_In_Bytes condition="Equals">287744</FileObj:Size_In_Bytes>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">2809E15A3A54484E042FE65FFFD17409</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">4A8F0331ABAF8F629B3C8220F0D55339CFA30223</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">518544E56E8CCEE401FFA1B0A01A10CE23E49EC21EC441C6C7C3951B01C1B19C</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">3072:D5IwIMZKkczttW5ivhjqKO1I9Goh6F4mAqeormMkpCWlunhNGA5yjszVIEe9:NIMsztZZ+KQqGo5QfmLpCoun6W</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2019-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-b76dc24b-d111-4569-af38-0f797f1faa04" timestamp="2024-02-28T22:05:57.247112+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-91823217-fd44-4df1-8988-9f41de7b171c">
                <cybox:Object id="CISA:Object-e93e628a-6b16-4b04-9862-79f30b3078b1">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helpfiles@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2023-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-699fe04e-1072-4616-ac3e-69deedaa8e50" timestamp="2024-02-28T22:05:57.247560+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious IPv4 Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">IP Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-c319c178-d34e-49e8-85ed-2c39f3f4efca">
                <cybox:Object id="CISA:Object-e5eb42ae-0eba-44e3-b578-d69fbae2364c">
                    <cybox:Properties xsi:type="AddressObj:AddressObjectType" category="ipv4-addr" is_spoofed="false">
                        <AddressObj:Address_Value condition="Equals">147.78.47.224</AddressObj:Address_Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2022-10-25T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-8b50e665-2f6a-40ea-88a6-6c8991de7dd1" timestamp="2024-02-28T22:05:57.247954+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious E-mail Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">Malicious E-mail</indicator:Type>
            <indicator:Observable id="CISA:Observable-c30fd41d-d79e-4bea-a469-e90379f07019">
                <cybox:Object id="CISA:Object-14f0f916-33db-4d49-a75f-f4c6ef49c419">
                    <cybox:Properties xsi:type="EmailMessageObj:EmailMessageObjectType">
                        <EmailMessageObj:Header>
                            <EmailMessageObj:From xsi:type="AddressObj:AddressObjectType" category="e-mail">
                                <AddressObj:Address_Value condition="Equals">helpermail@onionmail.org</AddressObj:Address_Value>
                            </EmailMessageObj:From>
                        </EmailMessageObj:Header>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2022-03-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-07fefc6a-443c-43b5-9981-232e6fee6034" timestamp="2024-02-28T22:05:57.248375+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-222eb988-19ea-4272-a550-271c36fd8a5f">
                <cybox:Object id="CISA:Object-e2941434-a939-45f0-8496-85afb339df47">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:File_Name condition="Equals">f1425cff3d28afe5245459afa6d7985081bc6a62f86dce64c63daeb2136d7d2c.bin</FileObj:File_Name>
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">DB74CD067D4A0562B26EA4F10E943E3B</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">33DEF89AD18A6C3DBAA4B5B5075A84A771157441</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">F1425CFF3D28AFE5245459AFA6D7985081BC6A62F86DCE64C63DAEB2136D7D2C</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">1536:EGK2GvyWya1pamI5f23vvdWjJfLqcKXkLReWk2Q9Gusz22/:T6qWFamI5mvgJfGcoYvQ9+</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2024-02-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-04548e3b-68c5-4016-b8b6-8b6ec7e279a0" timestamp="2024-02-28T22:05:57.249070+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious IPv4 Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">IP Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-f8adc550-7570-42f1-babf-bb219fc97bbc">
                <cybox:Object id="CISA:Object-5531256e-3290-4032-8579-f260c1906526">
                    <cybox:Properties xsi:type="AddressObj:AddressObjectType" category="ipv4-addr" is_spoofed="false">
                        <AddressObj:Address_Value condition="Equals">185.202.0.111</AddressObj:Address_Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2016-12-26T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-35b44a8b-5854-485a-a1a4-409c1b1ce0f8" timestamp="2024-02-28T22:05:57.249512+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious IPv4 Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">IP Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-1d33853b-5946-47ca-8b01-05d98854efab">
                <cybox:Object id="CISA:Object-1a033f30-e2a7-4cdc-8f8d-6ed8eeae0e3f">
                    <cybox:Properties xsi:type="AddressObj:AddressObjectType" category="ipv4-addr" is_spoofed="false">
                        <AddressObj:Address_Value condition="Equals">194.165.16.4</AddressObj:Address_Value>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2023-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
        <stix:Indicator id="CISA:Indicator-9a873b03-58ba-42f9-aff6-c327b8cd9c37" timestamp="2024-02-28T22:05:57.249920+00:00" xsi:type='indicator:IndicatorType'>
            <indicator:Title>Malicious File Indicator</indicator:Title>
            <indicator:Type xsi:type="stixVocabs:IndicatorTypeVocab-1.1">File Hash Watchlist</indicator:Type>
            <indicator:Observable id="CISA:Observable-9fd6dcfe-ad89-4787-8fc4-5f0f90d0ab62">
                <cybox:Object id="CISA:Object-3fbd4f71-9c43-4bf5-95d2-3f6d315db5d8">
                    <cybox:Properties xsi:type="FileObj:FileObjectType">
                        <FileObj:Hashes>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">MD5</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">E59FFEAF7ACB0C326E452FA30BB71A36</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA1</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">C88FAD293256BFEAD6962124394DE4F8B97765AA</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SHA256</cyboxCommon:Type>
                                <cyboxCommon:Simple_Hash_Value condition="Equals">A91491F45B851A07F91BA5A200967921BF796D38677786DE51A4A8FE5DDEAFD2</cyboxCommon:Simple_Hash_Value>
                            </cyboxCommon:Hash>
                            <cyboxCommon:Hash>
                                <cyboxCommon:Type condition="Equals" xsi:type="cyboxVocabs:HashNameVocab-1.0">SSDEEP</cyboxCommon:Type>
                                <cyboxCommon:Fuzzy_Hash_Value condition="Equals">1536:zkGB8nHbKUvryElSpi8jCZGcqDKlKnr8dV+99rmuoENA4Cj:zFBMHRvrAjCZmKcnr8YrfA4Cj</cyboxCommon:Fuzzy_Hash_Value>
                            </cyboxCommon:Hash>
                        </FileObj:Hashes>
                    </cybox:Properties>
                </cybox:Object>
            </indicator:Observable>
            <indicator:Sightings sightings_count="1">
                <indicator:Sighting timestamp="2019-05-01T00:00:00"/>
            </indicator:Sightings>
        </stix:Indicator>
    </stix:Indicators>
    <stix:TTPs>
        <stix:TTP id="CISA:ttp-7885d1e6-dc0d-470a-9246-e71dea7c5984" timestamp="2024-02-28T22:05:57.203732+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Reconnaissance - Active Scanning: Scanning IP Blocks [T1595.001]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-d13f8183-00e0-4717-8a98-b117203fc5ef" timestamp="2024-02-28T22:05:57.205150+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Reconnaissance - Phishing for Information [T1598]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-911f51c9-02e9-4e93-a84c-367a0489becb" timestamp="2024-02-28T22:05:57.205330+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Reconnaissance - Search Open Websites/Domains [T1593]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-b51d9211-5687-4748-8bc7-251a4956eca2" timestamp="2024-02-28T22:05:57.205495+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Resource Development - Establish Accounts [T1585]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-f1e184df-da80-438f-b4d7-2cfae7a00133" timestamp="2024-02-28T22:05:57.205625+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Resource Development - Obtain Capabilities: Tool [T1588.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-92f31603-c6b3-4f0d-8993-fde4d9763610" timestamp="2024-02-28T22:05:57.205748+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Initial Access - External Remote Services [T1133]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-477365a4-1665-4af9-91b0-2202661a9c13" timestamp="2024-02-28T22:05:57.205869+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Initial Access - Phishing: Spearphishing Attachment [T1566.001]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-2d860122-1d5b-4a59-9dc9-619f656a4396" timestamp="2024-02-28T22:05:57.205987+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Initial Access - Valid Accounts [T1078]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-fe27da03-ea9e-40e7-b6bb-f6de0d1c0d97" timestamp="2024-02-28T22:05:57.206106+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Execution - Command and Scripting Interpreter: Windows Command Shell [T1059.003]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-47d64720-638b-47ab-8ba8-6c0e45a348ba" timestamp="2024-02-28T22:05:57.206224+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Execution - Native API [T1106]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-72ef2355-a076-4c31-8801-740c6dd005b9" timestamp="2024-02-28T22:05:57.206344+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Execution - User Execution: Malicious File [T1204.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-ec416325-f906-4d4c-82a5-e8b507f51db4" timestamp="2024-02-28T22:05:57.206485+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Execution - Windows Management Instrumentation [T1047]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-5f1f4358-d738-42e5-a79a-4fb873bae0da" timestamp="2024-02-28T22:05:57.206606+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Persistence - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [T1547.001]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-3fd88844-7672-48ad-a4db-d8b62c641eb8" timestamp="2024-02-28T22:05:57.206724+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Privilege Escalation - Access Token Manipulation: Create Process with Token [T1134.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-038fa9ba-7391-4962-9a37-274a2c1e2efd" timestamp="2024-02-28T22:05:57.206842+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Privilege Escalation - Access Token Manipulation: Token Impersonation/Theft [T1134.001]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-b5b359ab-724b-4cab-9d35-cb51b8536036" timestamp="2024-02-28T22:05:57.206961+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Privilege Escalation - Process Injection: Asynchronous Procedure Call [T1055.004]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-81a87479-6fe1-4cd4-8c13-8fdc876322e6" timestamp="2024-02-28T22:05:57.207078+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Privilege Escalation - Process Injection: Portable Executable Injection [T1055.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-d69a935e-40e8-4d5a-a70a-3c96434e0845" timestamp="2024-02-28T22:05:57.207195+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - Deobfuscate/Decode Files or Information [T1140]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-ea44d452-8b1b-4119-ad79-cb5e683b47c0" timestamp="2024-02-28T22:05:57.207358+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - Impair Defenses [T1562]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-2a5824aa-95d7-4391-9681-cfded3b42ff8" timestamp="2024-02-28T22:05:57.207504+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - Impair Defenses: Disable or Modify System Firewall [T1562.004]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-0db65602-c27e-4c6e-a932-8c6160f13d65" timestamp="2024-02-28T22:05:57.207623+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - Obfuscated Files or Information: Embedded Payloads [T1027.009]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-fc6f7a89-77f5-4c90-8d68-5777c2fa6dcf" timestamp="2024-02-28T22:05:57.207740+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - Obfuscated Files or Information: Software Packing [T1027.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-d602bc61-405d-4c0b-b29d-84e047fd6740" timestamp="2024-02-28T22:05:57.207858+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Defense Evasion - System Binary Proxy Execution: Mshta [T1218.005]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-f2108435-67ce-45b5-adc9-b97f071d20ce" timestamp="2024-02-28T22:05:57.207973+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - Brute Force [T1110]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-2cacbea5-a055-4e68-8bea-0e96b031909f" timestamp="2024-02-28T22:05:57.208089+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - Credentials from Password Stores [T1555]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-9236a2ac-e413-43c8-a777-7237e27b15c5" timestamp="2024-02-28T22:05:57.208207+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - Credentials from Password Stores: Credentials from Web Browsers [T1555.003]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-de7c9589-6f07-49e6-816f-d4aa37cbe37d" timestamp="2024-02-28T22:05:57.208322+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - Credentials from Password Stores: Password Managers [T1555.005]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-bad5218c-1a31-49bf-aef4-d758c3822a50" timestamp="2024-02-28T22:05:57.208459+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - OS Credential Dumping: Cached Domain Credentials [T1003.005]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-6c4e31e1-d3db-4fec-bd24-314e5cfcca67" timestamp="2024-02-28T22:05:57.208583+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Credential Access - OS Credential Dumping: LSASS Memory [T1003.001]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-a585dce8-eb74-4c50-9cfa-ef147882d4e1" timestamp="2024-02-28T22:05:57.208710+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Discovery - Account Discovery: Domain Account [T1087.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-230eac0d-d2b8-40a0-bac3-b1d63ce521f1" timestamp="2024-02-28T22:05:57.208830+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Discovery - File and Directory Discovery [T1083]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-234fda02-a774-4ae4-9e78-2ab9e9d715af" timestamp="2024-02-28T22:05:57.208946+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Discovery - Process Discovery [T1057]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-546bb0e3-78d8-4104-8dfe-d3562beb927c" timestamp="2024-02-28T22:05:57.209062+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Discovery - System Information Discovery [T1082]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-a88afab4-2849-4df1-bdea-41a8a1c5c7e0" timestamp="2024-02-28T22:05:57.209219+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Collection - Archive Collected Data [T1560]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-b320f087-032d-454a-b53b-f4f1ac2f2f0f" timestamp="2024-02-28T22:05:57.209336+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Command and Control - Application Layer Protocol: File Transfer Protocols [T1071.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-4a713d36-0bc1-4128-99f7-ddb54957e457" timestamp="2024-02-28T22:05:57.209475+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Command and Control - Data Obfuscation: Protocol Impersonation [T1001.003]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-edf731e6-0dc3-48c1-b8e5-ffb15a7e131f" timestamp="2024-02-28T22:05:57.209596+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Command and Control - Remote Access Software [T1219]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-e90ea865-a59c-475b-a4c0-a79dcba54df9" timestamp="2024-02-28T22:05:57.209711+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Command and Control - Remote File Copy [T1105]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-3a6d5fb4-a0b6-459f-a906-3187f002b313" timestamp="2024-02-28T22:05:57.209826+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Exfiltration - Exfiltration Over Alternative Protocol [T1048]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-d6a00117-3c2d-4952-bc43-38c2e9a07235" timestamp="2024-02-28T22:05:57.209940+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Exfiltration - Exfiltration Over Web Service: Exfiltration to Cloud Storage [T1567.002]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-5d4238ba-7ab4-4dfb-b158-3ebac8bb7fc2" timestamp="2024-02-28T22:05:57.210055+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Impact - Data Encrypted for Impact [T1486]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:TTP id="CISA:ttp-b1fbd265-3ef0-47c7-9b86-b1514deb1e7f" timestamp="2024-02-28T22:05:57.210171+00:00" xsi:type='ttp:TTPType'>
            <ttp:Behavior>
                <ttp:Attack_Patterns>
                    <ttp:Attack_Pattern>
                        <ttp:Title>Impact - Inhibit System Recovery [T1490]</ttp:Title>
                    </ttp:Attack_Pattern>
                </ttp:Attack_Patterns>
            </ttp:Behavior>
        </stix:TTP>
        <stix:Kill_Chains>
            <stixCommon:Kill_Chain reference="http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf" number_of_phases="7" id="stix:KillChain-af3e707f-2fb9-49e5-8c37-14026ca0a5ff" definer="LMCO" name="LM Cyber Kill Chain">
                <stixCommon:Kill_Chain_Phase ordinality="1" name="Reconnaissance" phase_id="stix:KillChainPhase-af1016d6-a744-4ed7-ac91-00fe2272185a"/>
                <stixCommon:Kill_Chain_Phase ordinality="2" name="Weaponization" phase_id="stix:KillChainPhase-445b4827-3cca-42bd-8421-f2e947133c16"/>
                <stixCommon:Kill_Chain_Phase ordinality="3" name="Delivery" phase_id="stix:KillChainPhase-79a0e041-9d5f-49bb-ada4-8322622b162d"/>
                <stixCommon:Kill_Chain_Phase ordinality="4" name="Exploitation" phase_id="stix:KillChainPhase-f706e4e7-53d8-44ef-967f-81535c9db7d0"/>
                <stixCommon:Kill_Chain_Phase ordinality="5" name="Installation" phase_id="stix:KillChainPhase-e1e4e3f7-be3b-4b39-b80a-a593cfd99a4f"/>
                <stixCommon:Kill_Chain_Phase ordinality="6" name="Command and Control" phase_id="stix:KillChainPhase-d6dc32b9-2538-4951-8733-3cb9ef1daae2"/>
                <stixCommon:Kill_Chain_Phase ordinality="7" name="Actions on Objectives" phase_id="stix:KillChainPhase-786ca8f9-2d9a-4213-b38e-399af4a2e5d6"/>
            </stixCommon:Kill_Chain>
            <stixCommon:Kill_Chain reference="https://attack.mitre.org/tactics/enterprise/" number_of_phases="12" id="CISA:KillChain-968782b1-64f0-4eab-8f85-ddf63cf0afbe" definer="MITRE" name="ATT&amp;CK Tactics">
                <stixCommon:Kill_Chain_Phase ordinality="1" name="Initial Access" phase_id="CISA:KillChainPhase-d7dcc502-4084-4f94-bbbf-082628eeab1f"/>
                <stixCommon:Kill_Chain_Phase ordinality="2" name="Execution" phase_id="CISA:KillChainPhase-09de39a7-fd05-4650-9216-4676008644b9"/>
                <stixCommon:Kill_Chain_Phase ordinality="3" name="Persistence" phase_id="CISA:KillChainPhase-ae90bca2-ef95-4007-8518-bcbdfe9aca8f"/>
                <stixCommon:Kill_Chain_Phase ordinality="4" name="Privilege Escalation" phase_id="CISA:KillChainPhase-c2044d94-6fcb-40a8-bc93-31e9a64b3b31"/>
                <stixCommon:Kill_Chain_Phase ordinality="5" name="Defense Evasion" phase_id="CISA:KillChainPhase-26903764-b2d4-4e67-94b7-85bd4702cc4a"/>
                <stixCommon:Kill_Chain_Phase ordinality="6" name="Credential Access" phase_id="CISA:KillChainPhase-fd05b7de-702b-494b-93f1-4317ee4f8a3e"/>
                <stixCommon:Kill_Chain_Phase ordinality="7" name="Discovery" phase_id="CISA:KillChainPhase-fbd6dd2f-5c07-4089-908d-3931eb27dfed"/>
                <stixCommon:Kill_Chain_Phase ordinality="8" name="Lateral Movement" phase_id="CISA:KillChainPhase-c90a5d62-9f66-4a41-adef-ffa6cb2d2f94"/>
                <stixCommon:Kill_Chain_Phase ordinality="9" name="Collection" phase_id="CISA:KillChainPhase-b9ee5299-93a2-4580-a100-ae7752cdfa3f"/>
                <stixCommon:Kill_Chain_Phase ordinality="10" name="Command and Control" phase_id="CISA:KillChainPhase-5740037d-87bd-4825-a174-722f4db359bc"/>
                <stixCommon:Kill_Chain_Phase ordinality="11" name="Exfiltration" phase_id="CISA:KillChainPhase-0db0901a-007c-452f-833a-b73e772b0dd0"/>
                <stixCommon:Kill_Chain_Phase ordinality="12" name="Impact" phase_id="CISA:KillChainPhase-d3aaef09-1a3a-4b12-8edc-fc4a68d7e3e7"/>
            </stixCommon:Kill_Chain>
        </stix:Kill_Chains>
    </stix:TTPs>
</stix:STIX_Package>

