{
  "type": "URL",
  "indicator": "https://pay.jx-ll.cn",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://pay.jx-ll.cn",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3433455305,
      "indicator": "https://pay.jx-ll.cn",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "668cebf4b3498d2f9b9e9596",
          "name": "Trojan:Win32/Predator - walmartmobile.cn",
          "description": "Monitoring, invalid URLs, malicious redirects, cams,cyber crime, red team contract. Collects targets, calls, photos, network, dns, disables proxy, movies services,, messages, shopping habits, contacts. Intrusive as always.",
          "modified": "2024-08-08T07:05:50.946000",
          "created": "2024-07-09T07:51:16.371000",
          "tags": [
            "popularity",
            "ingestion time",
            "utc cisco",
            "umbrella",
            "utc statvoo",
            "record type",
            "server",
            "dnssec",
            "email",
            "dns replication",
            "android",
            "files",
            "china unknown",
            "as4837 china",
            "aaaa",
            "search",
            "moved",
            "net technology",
            "for privacy",
            "name servers",
            "redacted for",
            "encrypt",
            "body",
            "next",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ipv4",
            "url analysis",
            "location china",
            "script script",
            "td tr",
            "please",
            "please enter",
            "za z0",
            "server ca",
            "meta",
            "a li",
            "a domains",
            "ul div",
            "443 ma2592000",
            "gmt content",
            "servers",
            "https",
            "self",
            "hostname",
            "window",
            "icloud_apple_id",
            "apple",
            "apple ios",
            "apple id",
            "apple message",
            "msie",
            "chrome",
            "title",
            "head body",
            "center hr",
            "united",
            "unknown",
            "as32934",
            "as13414 twitter",
            "as19679 dropbox",
            "as20940",
            "kos",
            "walmart",
            "calls",
            "checking",
            "latest version",
            "invoked methods",
            "highlighted",
            "shell commands",
            "written",
            "files deleted",
            "files copied",
            "file",
            "process",
            "post http",
            "request",
            "get http",
            "dns resolutions",
            "ip traffic",
            "process32nextw",
            "shellexecuteexw",
            "get na",
            "entries",
            "medium",
            "show",
            "china as4837",
            "yara detections",
            "regsetvalueexw",
            "dock",
            "write",
            "win32",
            "persistence",
            "execution",
            "copy",
            "cname",
            "asnone united",
            "registrar",
            "as2914 ntt",
            "hichina",
            "certificate",
            "showing",
            "as142403 yisu",
            "china asn",
            "suspicious",
            "open",
            "write c",
            "create c",
            "read c",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "default",
            "discovery",
            "xebrbxeax1ezxf0",
            "sxe0x0cx1cxf8",
            "invalid url",
            "status",
            "reflection",
            "telephony",
            "yuming",
            "domain",
            "expiration date",
            "div div",
            "a div",
            "span a",
            "script urls",
            "p span",
            "pragma",
            "trident",
            "form",
            "applei_imessage_ios",
            "as4134 chinanet",
            "as3356 level",
            "asnone china",
            "date",
            "tsara brashears",
            "rwi dtools",
            "pyinstaller",
            "password",
            "cybercrime",
            "valid from",
            "number",
            "thumbprint",
            "ipwnderv1",
            "hacktool",
            "phishing",
            "facebook",
            "all search",
            "otx scoreblue",
            "pulse submit",
            "injection",
            "mobile",
            "tmobile"
          ],
          "references": [
            "walmartmobile.cn",
            "malware_hosting IP's:42.177.83.115 | IPv4 42.177.83.134 malware_hosting",
            "Apple Spy: iphone-say.com apple-prompt-iphone.com  http://www.apple-prompt-iphone.com/",
            "Apple Spy: 113-dd-hppg.redirectme.netiphonepofentrydstaging2zsendlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
            "Apple Spy: cmlinki-img-3radio-iphone-web-cmlinki3-iphone-web-cmlinkiradio.redirectme.netoppofentryd.0-iphone-web-cmlinkiradio-iphone-web-cm",
            "Apple Spy:  redirectme.netiphonepofentrydstaging2znetoppofindlabstryd.netoppofindhypernova.ali.zomans.com",
            "Apple Spy:  113-dd-hppg.redirectme.netiphonepofentrydiotging2znetoppofindlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
            "Trojan:Win32/Predator!: FileHash-SHA256 1cf6574bb7edda08a539fdb2885a959071b60d9c9bfb44ee1b9912b3864ff758",
            "Trojan:Win32/Predator!: FileHash-SHA256 493323dd39ebb91b861e63c7341d037877886bc3a6cf4deaef08ef76bb9db15e",
            "Trojan:Win32/Predator!: FileHash-SHA256 f7da3472e0f81fa37ea05cc91338b6a693a1fcd4d30025fdfbfc7f2f0119fa20",
            "traceability-qa.walmartmobile.cn",
            "http://img01.mifile.cn/m/apk/mishop_3.0.20141212_1.1.1.apk",
            "http://tshop.doido.com",
            "Antivirus Detections Win32:Malware-gen: Yara Detections: stack_string",
            "Alerts: dead_host network_icmp antivm_generic_services creates_largekey disables_proxy dumped_buffer network_cnc_http",
            "Alerts: network_http allocates_rwx stealth_window injection_process_search process_interest",
            "Antivirus Detections: ALF:HeraklezEval:Trojan:Win32/Asacky!rfn ,  ALF:HeraklezEval:Trojan:Win32/Predator!rfn ,   Win.Trojan.Generic-9789164-0",
            "IDS Detections: : Suspicious User-Agent (HTTP Downloader) Suspicious User-Agent containing Loader Observed",
            "Unique antivirus detections for files communicating with IP address",
            "hpcc-page.cnc.ccgslb.com.cn 121.30.192.9 58.20.206.154 139.209.89.125 124.67.23.253 61.180.227.172 61.162.172.185 IP Traffic",
            "TCP 123.125.159.119:80 (gad.page.cnc.ccgslb.com.cn) TCP 121.30.192.9:80 (hpcc-page.cnc.ccgslb.com.cn) TCP 121.30.193.30: Technique ID: T1140 Technique Name: Deobfuscate/Decode Files or Information  Medium { \"families\": [], \"description\": \"One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.\", Technique ID: T1055 Technique Name: Process Injection  A common use for this is when applications run in the system tray, but don't also want to sh"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore",
            "Brazil",
            "Ireland",
            "Germany",
            "Chile",
            "China",
            "Switzerland"
          ],
          "malware_families": [
            {
              "id": "RiskTool.AndroidOS.beto",
              "display_name": "RiskTool.AndroidOS.beto",
              "target": null
            },
            {
              "id": "Trojan.TrojanBanker.Android",
              "display_name": "Trojan.TrojanBanker.Android",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Predator!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Predator!rfn",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1737,
            "hostname": 4754,
            "URL": 11496,
            "FileHash-MD5": 96,
            "FileHash-SHA1": 79,
            "FileHash-SHA256": 2457,
            "email": 11,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 20632,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "619 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d7edae64c19a8b55097",
          "name": "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/",
          "description": "",
          "modified": "2023-12-06T15:04:30.727000",
          "created": "2023-12-06T15:04:30.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1194,
            "domain": 211,
            "hostname": 628,
            "URL": 945
          },
          "indicator_count": 2978,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62787c48325ab8f3160860cb",
          "name": "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/",
          "description": "",
          "modified": "2022-06-08T00:03:25.734000",
          "created": "2022-05-09T02:28:24.504000",
          "tags": [
            "date",
            "found",
            "network traffic",
            "wayback machine",
            "search",
            "sign",
            "donate",
            "friday",
            "upload",
            "upload user",
            "texts",
            "books video",
            "video audio",
            "corefoundation",
            "foundation",
            "qos user",
            "interactive",
            "qos default",
            "cfnetwork",
            "initiated",
            "identifier",
            "adam id",
            "is first",
            "twitter"
          ],
          "references": [
            "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/bafkreibf4rnl3oeoaavx66es2e4dth4hofqxjdmy5o3zxkvaxktak5bngq?g=https://%7Bcid%7D.ipfs.nftstorage.link/&c=bafkreiczfkzcz4pqoghjdk6prm7vtv4ccbsxzrtav5pdwpcijaniajxjqi&c=bafkreift2cqgbltqci7f2wt5tpclmffqrelymsrlg4arc4jf5ti7baj3mm&c=bafkreifdjwbl7pi4js6qw2nvwqzap2esb6k4rksokwu2vsad5ywjdjb4ja&c=bafkreifo7jrbdw25kbdli27bavvm5yqdloykagrusikkfcjwpv62yygite&c=bafkreif44lgcpn6tbghqc7d33wgavdoug6xj5246adskkes3fpnplabynu&c=bafkreieon4agc72kxd4dlcmgzigthhgkmf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 945,
            "FileHash-SHA256": 1194,
            "domain": 211,
            "hostname": 628
          },
          "indicator_count": 2978,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 394,
          "modified_text": "1411 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626fd4592a216bbee6d23726",
          "name": "CSGOFITZ - Wheel of Fortune",
          "description": "",
          "modified": "2022-05-31T00:03:47.846000",
          "created": "2022-05-02T12:53:44.993000",
          "tags": [
            "csgo",
            "gambling",
            "skins",
            "opencase",
            "bets",
            "random",
            "salt",
            "hash",
            "robot keep",
            "eren",
            "level",
            "csgofitz",
            "lexe1ko",
            "fatality",
            "fair",
            "service",
            "donald",
            "team",
            "refresh",
            "magic",
            "shark",
            "premium"
          ],
          "references": [
            "https://urlscan.io/dom/fb71514a-d248-4388-a4fa-b6c2219bf06d/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 184,
            "hostname": 129,
            "FileHash-SHA256": 458,
            "domain": 43,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 15
          },
          "indicator_count": 830,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1419 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6269592e9183637acd7efd9e",
          "name": "cybergorillas.mypinata.cloud - chinese or Korean",
          "description": "",
          "modified": "2022-05-27T00:00:15.468000",
          "created": "2022-04-27T14:54:38.008000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 314,
            "URL": 464,
            "domain": 90,
            "FileHash-SHA256": 208
          },
          "indicator_count": 1076,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1423 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "IDS Detections: : Suspicious User-Agent (HTTP Downloader) Suspicious User-Agent containing Loader Observed",
        "http://img01.mifile.cn/m/apk/mishop_3.0.20141212_1.1.1.apk",
        "Unique antivirus detections for files communicating with IP address",
        "Trojan:Win32/Predator!: FileHash-SHA256 f7da3472e0f81fa37ea05cc91338b6a693a1fcd4d30025fdfbfc7f2f0119fa20",
        "Apple Spy: cmlinki-img-3radio-iphone-web-cmlinki3-iphone-web-cmlinkiradio.redirectme.netoppofentryd.0-iphone-web-cmlinkiradio-iphone-web-cm",
        "hpcc-page.cnc.ccgslb.com.cn 121.30.192.9 58.20.206.154 139.209.89.125 124.67.23.253 61.180.227.172 61.162.172.185 IP Traffic",
        "traceability-qa.walmartmobile.cn",
        "https://urlscan.io/dom/fb71514a-d248-4388-a4fa-b6c2219bf06d/",
        "Apple Spy:  113-dd-hppg.redirectme.netiphonepofentrydiotging2znetoppofindlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
        "Apple Spy: iphone-say.com apple-prompt-iphone.com  http://www.apple-prompt-iphone.com/",
        "Alerts: dead_host network_icmp antivm_generic_services creates_largekey disables_proxy dumped_buffer network_cnc_http",
        "malware_hosting IP's:42.177.83.115 | IPv4 42.177.83.134 malware_hosting",
        "Trojan:Win32/Predator!: FileHash-SHA256 1cf6574bb7edda08a539fdb2885a959071b60d9c9bfb44ee1b9912b3864ff758",
        "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/bafkreibf4rnl3oeoaavx66es2e4dth4hofqxjdmy5o3zxkvaxktak5bngq?g=https://%7Bcid%7D.ipfs.nftstorage.link/&c=bafkreiczfkzcz4pqoghjdk6prm7vtv4ccbsxzrtav5pdwpcijaniajxjqi&c=bafkreift2cqgbltqci7f2wt5tpclmffqrelymsrlg4arc4jf5ti7baj3mm&c=bafkreifdjwbl7pi4js6qw2nvwqzap2esb6k4rksokwu2vsad5ywjdjb4ja&c=bafkreifo7jrbdw25kbdli27bavvm5yqdloykagrusikkfcjwpv62yygite&c=bafkreif44lgcpn6tbghqc7d33wgavdoug6xj5246adskkes3fpnplabynu&c=bafkreieon4agc72kxd4dlcmgzigthhgkmf",
        "Antivirus Detections: ALF:HeraklezEval:Trojan:Win32/Asacky!rfn ,  ALF:HeraklezEval:Trojan:Win32/Predator!rfn ,   Win.Trojan.Generic-9789164-0",
        "walmartmobile.cn",
        "TCP 123.125.159.119:80 (gad.page.cnc.ccgslb.com.cn) TCP 121.30.192.9:80 (hpcc-page.cnc.ccgslb.com.cn) TCP 121.30.193.30: Technique ID: T1140 Technique Name: Deobfuscate/Decode Files or Information  Medium { \"families\": [], \"description\": \"One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.\", Technique ID: T1055 Technique Name: Process Injection  A common use for this is when applications run in the system tray, but don't also want to sh",
        "Alerts: network_http allocates_rwx stealth_window injection_process_search process_interest",
        "Apple Spy:  redirectme.netiphonepofentrydstaging2znetoppofindlabstryd.netoppofindhypernova.ali.zomans.com",
        "Apple Spy: 113-dd-hppg.redirectme.netiphonepofentrydstaging2zsendlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
        "Trojan:Win32/Predator!: FileHash-SHA256 493323dd39ebb91b861e63c7341d037877886bc3a6cf4deaef08ef76bb9db15e",
        "http://tshop.doido.com",
        "Antivirus Detections Win32:Malware-gen: Yara Detections: stack_string"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan.trojanbanker.android",
            "Risktool.androidos.beto",
            "Alf:heraklezeval:trojan:win32/predator!rfn"
          ],
          "industries": [],
          "unique_indicators": 25608
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/jx-ll.cn",
    "whois": "http://whois.domaintools.com/jx-ll.cn",
    "domain": "jx-ll.cn",
    "hostname": "pay.jx-ll.cn"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "668cebf4b3498d2f9b9e9596",
      "name": "Trojan:Win32/Predator - walmartmobile.cn",
      "description": "Monitoring, invalid URLs, malicious redirects, cams,cyber crime, red team contract. Collects targets, calls, photos, network, dns, disables proxy, movies services,, messages, shopping habits, contacts. Intrusive as always.",
      "modified": "2024-08-08T07:05:50.946000",
      "created": "2024-07-09T07:51:16.371000",
      "tags": [
        "popularity",
        "ingestion time",
        "utc cisco",
        "umbrella",
        "utc statvoo",
        "record type",
        "server",
        "dnssec",
        "email",
        "dns replication",
        "android",
        "files",
        "china unknown",
        "as4837 china",
        "aaaa",
        "search",
        "moved",
        "net technology",
        "for privacy",
        "name servers",
        "redacted for",
        "encrypt",
        "body",
        "next",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ipv4",
        "url analysis",
        "location china",
        "script script",
        "td tr",
        "please",
        "please enter",
        "za z0",
        "server ca",
        "meta",
        "a li",
        "a domains",
        "ul div",
        "443 ma2592000",
        "gmt content",
        "servers",
        "https",
        "self",
        "hostname",
        "window",
        "icloud_apple_id",
        "apple",
        "apple ios",
        "apple id",
        "apple message",
        "msie",
        "chrome",
        "title",
        "head body",
        "center hr",
        "united",
        "unknown",
        "as32934",
        "as13414 twitter",
        "as19679 dropbox",
        "as20940",
        "kos",
        "walmart",
        "calls",
        "checking",
        "latest version",
        "invoked methods",
        "highlighted",
        "shell commands",
        "written",
        "files deleted",
        "files copied",
        "file",
        "process",
        "post http",
        "request",
        "get http",
        "dns resolutions",
        "ip traffic",
        "process32nextw",
        "shellexecuteexw",
        "get na",
        "entries",
        "medium",
        "show",
        "china as4837",
        "yara detections",
        "regsetvalueexw",
        "dock",
        "write",
        "win32",
        "persistence",
        "execution",
        "copy",
        "cname",
        "asnone united",
        "registrar",
        "as2914 ntt",
        "hichina",
        "certificate",
        "showing",
        "as142403 yisu",
        "china asn",
        "suspicious",
        "open",
        "write c",
        "create c",
        "read c",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "default",
        "discovery",
        "xebrbxeax1ezxf0",
        "sxe0x0cx1cxf8",
        "invalid url",
        "status",
        "reflection",
        "telephony",
        "yuming",
        "domain",
        "expiration date",
        "div div",
        "a div",
        "span a",
        "script urls",
        "p span",
        "pragma",
        "trident",
        "form",
        "applei_imessage_ios",
        "as4134 chinanet",
        "as3356 level",
        "asnone china",
        "date",
        "tsara brashears",
        "rwi dtools",
        "pyinstaller",
        "password",
        "cybercrime",
        "valid from",
        "number",
        "thumbprint",
        "ipwnderv1",
        "hacktool",
        "phishing",
        "facebook",
        "all search",
        "otx scoreblue",
        "pulse submit",
        "injection",
        "mobile",
        "tmobile"
      ],
      "references": [
        "walmartmobile.cn",
        "malware_hosting IP's:42.177.83.115 | IPv4 42.177.83.134 malware_hosting",
        "Apple Spy: iphone-say.com apple-prompt-iphone.com  http://www.apple-prompt-iphone.com/",
        "Apple Spy: 113-dd-hppg.redirectme.netiphonepofentrydstaging2zsendlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
        "Apple Spy: cmlinki-img-3radio-iphone-web-cmlinki3-iphone-web-cmlinkiradio.redirectme.netoppofentryd.0-iphone-web-cmlinkiradio-iphone-web-cm",
        "Apple Spy:  redirectme.netiphonepofentrydstaging2znetoppofindlabstryd.netoppofindhypernova.ali.zomans.com",
        "Apple Spy:  113-dd-hppg.redirectme.netiphonepofentrydiotging2znetoppofindlabstryd.0-enakamai-lanwpradiocen6.ali.zomans.com",
        "Trojan:Win32/Predator!: FileHash-SHA256 1cf6574bb7edda08a539fdb2885a959071b60d9c9bfb44ee1b9912b3864ff758",
        "Trojan:Win32/Predator!: FileHash-SHA256 493323dd39ebb91b861e63c7341d037877886bc3a6cf4deaef08ef76bb9db15e",
        "Trojan:Win32/Predator!: FileHash-SHA256 f7da3472e0f81fa37ea05cc91338b6a693a1fcd4d30025fdfbfc7f2f0119fa20",
        "traceability-qa.walmartmobile.cn",
        "http://img01.mifile.cn/m/apk/mishop_3.0.20141212_1.1.1.apk",
        "http://tshop.doido.com",
        "Antivirus Detections Win32:Malware-gen: Yara Detections: stack_string",
        "Alerts: dead_host network_icmp antivm_generic_services creates_largekey disables_proxy dumped_buffer network_cnc_http",
        "Alerts: network_http allocates_rwx stealth_window injection_process_search process_interest",
        "Antivirus Detections: ALF:HeraklezEval:Trojan:Win32/Asacky!rfn ,  ALF:HeraklezEval:Trojan:Win32/Predator!rfn ,   Win.Trojan.Generic-9789164-0",
        "IDS Detections: : Suspicious User-Agent (HTTP Downloader) Suspicious User-Agent containing Loader Observed",
        "Unique antivirus detections for files communicating with IP address",
        "hpcc-page.cnc.ccgslb.com.cn 121.30.192.9 58.20.206.154 139.209.89.125 124.67.23.253 61.180.227.172 61.162.172.185 IP Traffic",
        "TCP 123.125.159.119:80 (gad.page.cnc.ccgslb.com.cn) TCP 121.30.192.9:80 (hpcc-page.cnc.ccgslb.com.cn) TCP 121.30.193.30: Technique ID: T1140 Technique Name: Deobfuscate/Decode Files or Information  Medium { \"families\": [], \"description\": \"One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.\", Technique ID: T1055 Technique Name: Process Injection  A common use for this is when applications run in the system tray, but don't also want to sh"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Singapore",
        "Brazil",
        "Ireland",
        "Germany",
        "Chile",
        "China",
        "Switzerland"
      ],
      "malware_families": [
        {
          "id": "RiskTool.AndroidOS.beto",
          "display_name": "RiskTool.AndroidOS.beto",
          "target": null
        },
        {
          "id": "Trojan.TrojanBanker.Android",
          "display_name": "Trojan.TrojanBanker.Android",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Predator!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Predator!rfn",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1737,
        "hostname": 4754,
        "URL": 11496,
        "FileHash-MD5": 96,
        "FileHash-SHA1": 79,
        "FileHash-SHA256": 2457,
        "email": 11,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 20632,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "619 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708d7edae64c19a8b55097",
      "name": "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/",
      "description": "",
      "modified": "2023-12-06T15:04:30.727000",
      "created": "2023-12-06T15:04:30.727000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1194,
        "domain": 211,
        "hostname": 628,
        "URL": 945
      },
      "indicator_count": 2978,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "62787c48325ab8f3160860cb",
      "name": "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/",
      "description": "",
      "modified": "2022-06-08T00:03:25.734000",
      "created": "2022-05-09T02:28:24.504000",
      "tags": [
        "date",
        "found",
        "network traffic",
        "wayback machine",
        "search",
        "sign",
        "donate",
        "friday",
        "upload",
        "upload user",
        "texts",
        "books video",
        "video audio",
        "corefoundation",
        "foundation",
        "qos user",
        "interactive",
        "qos default",
        "cfnetwork",
        "initiated",
        "identifier",
        "adam id",
        "is first",
        "twitter"
      ],
      "references": [
        "https://web.archive.org/web/*/https://cloudflare-ipfs.com/ipfs/bafkreibf4rnl3oeoaavx66es2e4dth4hofqxjdmy5o3zxkvaxktak5bngq?g=https://%7Bcid%7D.ipfs.nftstorage.link/&c=bafkreiczfkzcz4pqoghjdk6prm7vtv4ccbsxzrtav5pdwpcijaniajxjqi&c=bafkreift2cqgbltqci7f2wt5tpclmffqrelymsrlg4arc4jf5ti7baj3mm&c=bafkreifdjwbl7pi4js6qw2nvwqzap2esb6k4rksokwu2vsad5ywjdjb4ja&c=bafkreifo7jrbdw25kbdli27bavvm5yqdloykagrusikkfcjwpv62yygite&c=bafkreif44lgcpn6tbghqc7d33wgavdoug6xj5246adskkes3fpnplabynu&c=bafkreieon4agc72kxd4dlcmgzigthhgkmf"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 945,
        "FileHash-SHA256": 1194,
        "domain": 211,
        "hostname": 628
      },
      "indicator_count": 2978,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 394,
      "modified_text": "1411 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "626fd4592a216bbee6d23726",
      "name": "CSGOFITZ - Wheel of Fortune",
      "description": "",
      "modified": "2022-05-31T00:03:47.846000",
      "created": "2022-05-02T12:53:44.993000",
      "tags": [
        "csgo",
        "gambling",
        "skins",
        "opencase",
        "bets",
        "random",
        "salt",
        "hash",
        "robot keep",
        "eren",
        "level",
        "csgofitz",
        "lexe1ko",
        "fatality",
        "fair",
        "service",
        "donald",
        "team",
        "refresh",
        "magic",
        "shark",
        "premium"
      ],
      "references": [
        "https://urlscan.io/dom/fb71514a-d248-4388-a4fa-b6c2219bf06d/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 184,
        "hostname": 129,
        "FileHash-SHA256": 458,
        "domain": 43,
        "FileHash-MD5": 1,
        "FileHash-SHA1": 15
      },
      "indicator_count": 830,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 393,
      "modified_text": "1419 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6269592e9183637acd7efd9e",
      "name": "cybergorillas.mypinata.cloud - chinese or Korean",
      "description": "",
      "modified": "2022-05-27T00:00:15.468000",
      "created": "2022-04-27T14:54:38.008000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 314,
        "URL": 464,
        "domain": 90,
        "FileHash-SHA256": 208
      },
      "indicator_count": 1076,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 392,
      "modified_text": "1423 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://pay.jx-ll.cn",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://pay.jx-ll.cn",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642647.4730952
}