{
  "type": "SHA256",
  "indicator": "16486b17c635038d0ff0a035d5c0c89bbd62ca6d85b4161060c5bd05de69924e",
  "general": {
    "sections": [
      "general",
      "analysis"
    ],
    "type": "sha256",
    "type_title": "FileHash-SHA256",
    "indicator": "16486b17c635038d0ff0a035d5c0c89bbd62ca6d85b4161060c5bd05de69924e",
    "validation": [],
    "base_indicator": {
      "id": 12324815,
      "indicator": "16486b17c635038d0ff0a035d5c0c89bbd62ca6d85b4161060c5bd05de69924e",
      "type": "FileHash-SHA256",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "591647914da2580eb4eaf2f6",
          "name": "BAIJIU: New Malware Abuses Popular Japanese Web Hosting Service",
          "description": "BAIJIU\u2019s goal in this attack was to deploy a set of espionage tools through a downloader we call TYPHOON and a set of backdoors we call LIONROCK.\n\nThree distinctive elements of BAIJIU drew and held our attention: the unusual complexity of the attack; the appropriation of web hosting service GeoCities (of 1990s fame); and the use of multiple methods of obfuscation.",
          "modified": "2017-07-22T10:27:11.952000",
          "created": "2017-05-12T23:38:57.499000",
          "tags": [
            "TYPHOON",
            "BAIJIU",
            "LIONROCK",
            "GeoCities"
          ],
          "references": [
            "https://www.cylance.com/en_us/blog/baijiu.html"
          ],
          "public": 1,
          "adversary": "DarkHotel",
          "targeted_countries": [
            "Korea, Democratic People's Republic of"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 19,
            "URL": 18,
            "YARA": 4
          },
          "indicator_count": 41,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 377517,
          "modified_text": "3192 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709b73974bdb5d6dbda090",
          "name": "InQuest - 12-05-2023",
          "description": "",
          "modified": "2023-12-06T16:04:03.542000",
          "created": "2023-12-06T16:04:03.542000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 836,
            "domain": 29,
            "FileHash-MD5": 58,
            "hostname": 37,
            "URL": 144,
            "FileHash-SHA1": 15
          },
          "indicator_count": 1119,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a43fc2f2788ff690928",
          "name": "InQuest - 08-05-2023",
          "description": "",
          "modified": "2023-12-06T15:58:59.481000",
          "created": "2023-12-06T15:58:59.481000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1009,
            "domain": 26,
            "FileHash-MD5": 69,
            "FileHash-SHA1": 26,
            "URL": 81,
            "hostname": 13
          },
          "indicator_count": 1224,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "645eca8e1c9d36afb890bcbf",
          "name": "InQuest - 12-05-2023",
          "description": "",
          "modified": "2023-05-12T23:23:58.470000",
          "created": "2023-05-12T23:23:58.470000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 58,
            "FileHash-SHA256": 836,
            "hostname": 37,
            "URL": 144,
            "IPv4": 67,
            "FileHash-SHA1": 15,
            "domain": 29
          },
          "indicator_count": 1186,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "1072 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        },
        {
          "id": "6459856bf299a1baab9f8241",
          "name": "InQuest - 08-05-2023",
          "description": "",
          "modified": "2023-05-08T23:27:39.018000",
          "created": "2023-05-08T23:27:39.018000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 69,
            "FileHash-SHA256": 1009,
            "IPv4": 97,
            "FileHash-SHA1": 26,
            "domain": 26,
            "URL": 81,
            "hostname": 13
          },
          "indicator_count": 1321,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "1076 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "FileHash-SHA256",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://labs.inquest.net/iocdb",
        "https://www.cylance.com/en_us/blog/baijiu.html"
      ],
      "related": {
        "alienvault": {
          "adversary": [
            "DarkHotel"
          ],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "591647914da2580eb4eaf2f6",
      "name": "BAIJIU: New Malware Abuses Popular Japanese Web Hosting Service",
      "description": "BAIJIU\u2019s goal in this attack was to deploy a set of espionage tools through a downloader we call TYPHOON and a set of backdoors we call LIONROCK.\n\nThree distinctive elements of BAIJIU drew and held our attention: the unusual complexity of the attack; the appropriation of web hosting service GeoCities (of 1990s fame); and the use of multiple methods of obfuscation.",
      "modified": "2017-07-22T10:27:11.952000",
      "created": "2017-05-12T23:38:57.499000",
      "tags": [
        "TYPHOON",
        "BAIJIU",
        "LIONROCK",
        "GeoCities"
      ],
      "references": [
        "https://www.cylance.com/en_us/blog/baijiu.html"
      ],
      "public": 1,
      "adversary": "DarkHotel",
      "targeted_countries": [
        "Korea, Democratic People's Republic of"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 58,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 19,
        "URL": 18,
        "YARA": 4
      },
      "indicator_count": 41,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 377517,
      "modified_text": "3192 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709b73974bdb5d6dbda090",
      "name": "InQuest - 12-05-2023",
      "description": "",
      "modified": "2023-12-06T16:04:03.542000",
      "created": "2023-12-06T16:04:03.542000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 836,
        "domain": 29,
        "FileHash-MD5": 58,
        "hostname": 37,
        "URL": 144,
        "FileHash-SHA1": 15
      },
      "indicator_count": 1119,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709a43fc2f2788ff690928",
      "name": "InQuest - 08-05-2023",
      "description": "",
      "modified": "2023-12-06T15:58:59.481000",
      "created": "2023-12-06T15:58:59.481000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1009,
        "domain": 26,
        "FileHash-MD5": 69,
        "FileHash-SHA1": 26,
        "URL": 81,
        "hostname": 13
      },
      "indicator_count": 1224,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "645eca8e1c9d36afb890bcbf",
      "name": "InQuest - 12-05-2023",
      "description": "",
      "modified": "2023-05-12T23:23:58.470000",
      "created": "2023-05-12T23:23:58.470000",
      "tags": [],
      "references": [
        "https://labs.inquest.net/iocdb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunterAutoFeed",
        "id": "182496",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 58,
        "FileHash-SHA256": 836,
        "hostname": 37,
        "URL": 144,
        "IPv4": 67,
        "FileHash-SHA1": 15,
        "domain": 29
      },
      "indicator_count": 1186,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1601,
      "modified_text": "1072 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    },
    {
      "id": "6459856bf299a1baab9f8241",
      "name": "InQuest - 08-05-2023",
      "description": "",
      "modified": "2023-05-08T23:27:39.018000",
      "created": "2023-05-08T23:27:39.018000",
      "tags": [],
      "references": [
        "https://labs.inquest.net/iocdb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunterAutoFeed",
        "id": "182496",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 69,
        "FileHash-SHA256": 1009,
        "IPv4": 97,
        "FileHash-SHA1": 26,
        "domain": 26,
        "URL": 81,
        "hostname": 13
      },
      "indicator_count": 1321,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 1600,
      "modified_text": "1076 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "FileHash-SHA256",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "16486b17c635038d0ff0a035d5c0c89bbd62ca6d85b4161060c5bd05de69924e",
    "type": "Hash"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "16486b17c635038d0ff0a035d5c0c89bbd62ca6d85b4161060c5bd05de69924e",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776590934.9983573
}