{
  "type": "URL",
  "indicator": "https://faluncinema.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://faluncinema.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4132426277,
      "indicator": "https://faluncinema.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "68cd76f1888c22a2e105e524",
          "name": "Sign in - Google Accounts | Ransomware G3nasom",
          "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
          "modified": "2025-10-19T14:00:01.535000",
          "created": "2025-09-19T15:29:53.126000",
          "tags": [
            "sign",
            "google account",
            "email",
            "forgot email",
            "private window",
            "learn",
            "guest mode",
            "next create",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "owotrus ca",
            "limited",
            "server ca",
            "python",
            "write",
            "trojan",
            "guard",
            "win64",
            "accept",
            "updater",
            "launcher",
            "malware",
            "contacted",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "passive dns",
            "google trust",
            "ip address",
            "related nids",
            "united",
            "url http",
            "present aug",
            "present sep",
            "present jul",
            "unknown aaaa",
            "domain",
            "title",
            "body",
            "trojandropper",
            "mtb sep",
            "meta",
            "next associated",
            "win32upatre sep",
            "backdoor",
            "ipv4",
            "moved",
            "ddos",
            "data upload",
            "extraction",
            "iocs",
            "failed",
            "source url",
            "indicato",
            "mat my",
            "data",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "found",
            "command",
            "initial access",
            "spawns",
            "chrome",
            "gmt content",
            "avast avg",
            "next http",
            "ascii text",
            "size",
            "pattern match",
            "mitre att",
            "error",
            "null",
            "android",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "trident",
            "write c",
            "medium",
            "search",
            "show",
            "high",
            "push",
            "service",
            "ms defender",
            "files matching",
            "number",
            "hide samples",
            "date hash",
            "next yara",
            "emotet",
            "g3nasom",
            "entries",
            "alerts show",
            "ck technique",
            "technique id",
            "io control",
            "anomalous",
            "geofencing",
            "sha256 add",
            "pulse pulses",
            "copy"
          ],
          "references": [
            "http://accounts.google.com/v3/signin/identifier",
            "Yara Detection: Cabinet _Archive",
            "Banking Malware"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/G3nasom",
              "display_name": "ALF:Trojan:Win32/G3nasom",
              "target": null
            },
            {
              "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Backdoor:Win32/Berbew",
              "display_name": "Backdoor:Win32/Berbew",
              "target": "/malware/Backdoor:Win32/Berbew"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.KDS!MTB",
              "display_name": "Trojan:Win32/Emotet.KDS!MTB",
              "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 531,
            "FileHash-SHA256": 1069,
            "URL": 1607,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 187,
            "SSLCertFingerprint": 25,
            "domain": 188,
            "email": 2
          },
          "indicator_count": 3884,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "182 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Yara Detection: Cabinet _Archive",
        "http://accounts.google.com/v3/signin/identifier",
        "Banking Malware"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Backdoor:win32/berbew",
            "Emotet",
            "Upatre",
            "Trojan:win32/emotet.kds!mtb",
            "Alf:trojan:win32/g3nasom",
            "Win.trojan.barys-10005825-0",
            "Win.ransomware.gandcrab-10044141-0\t(renamed g3nasom)",
            "Trojandropper:win32/muldrop.v!mtb"
          ],
          "industries": [],
          "unique_indicators": 3954
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/faluncinema.com",
    "whois": "http://whois.domaintools.com/faluncinema.com",
    "domain": "faluncinema.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "68cd76f1888c22a2e105e524",
      "name": "Sign in - Google Accounts | Ransomware G3nasom",
      "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
      "modified": "2025-10-19T14:00:01.535000",
      "created": "2025-09-19T15:29:53.126000",
      "tags": [
        "sign",
        "google account",
        "email",
        "forgot email",
        "private window",
        "learn",
        "guest mode",
        "next create",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "owotrus ca",
        "limited",
        "server ca",
        "python",
        "write",
        "trojan",
        "guard",
        "win64",
        "accept",
        "updater",
        "launcher",
        "malware",
        "contacted",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "passive dns",
        "google trust",
        "ip address",
        "related nids",
        "united",
        "url http",
        "present aug",
        "present sep",
        "present jul",
        "unknown aaaa",
        "domain",
        "title",
        "body",
        "trojandropper",
        "mtb sep",
        "meta",
        "next associated",
        "win32upatre sep",
        "backdoor",
        "ipv4",
        "moved",
        "ddos",
        "data upload",
        "extraction",
        "iocs",
        "failed",
        "source url",
        "indicato",
        "mat my",
        "data",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "found",
        "command",
        "initial access",
        "spawns",
        "chrome",
        "gmt content",
        "avast avg",
        "next http",
        "ascii text",
        "size",
        "pattern match",
        "mitre att",
        "error",
        "null",
        "android",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "trident",
        "write c",
        "medium",
        "search",
        "show",
        "high",
        "push",
        "service",
        "ms defender",
        "files matching",
        "number",
        "hide samples",
        "date hash",
        "next yara",
        "emotet",
        "g3nasom",
        "entries",
        "alerts show",
        "ck technique",
        "technique id",
        "io control",
        "anomalous",
        "geofencing",
        "sha256 add",
        "pulse pulses",
        "copy"
      ],
      "references": [
        "http://accounts.google.com/v3/signin/identifier",
        "Yara Detection: Cabinet _Archive",
        "Banking Malware"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/G3nasom",
          "display_name": "ALF:Trojan:Win32/G3nasom",
          "target": null
        },
        {
          "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Backdoor:Win32/Berbew",
          "display_name": "Backdoor:Win32/Berbew",
          "target": "/malware/Backdoor:Win32/Berbew"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.KDS!MTB",
          "display_name": "Trojan:Win32/Emotet.KDS!MTB",
          "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 531,
        "FileHash-SHA256": 1069,
        "URL": 1607,
        "FileHash-MD5": 275,
        "FileHash-SHA1": 187,
        "SSLCertFingerprint": 25,
        "domain": 188,
        "email": 2
      },
      "indicator_count": 3884,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "182 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://faluncinema.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://faluncinema.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642508.709562
}