{
  "type": "URL",
  "indicator": "https://wk3699.loglink9.site/bin/support.client...",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://wk3699.loglink9.site/bin/support.client...",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4054832252,
      "indicator": "https://wk3699.loglink9.site/bin/support.client...",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "67ef8acdfe632a32bd164cbc",
          "name": "Threat Intel Report - W11-2025",
          "description": "These are weekly base recommendations to all IT Administrators and CISOs to take corrective actions to upgrade their security infrastructure against newly identified threats and attacks in this week. \n\nSecurity is a continuous process, and it has to be reviewed and audited on a continuous manner through manual or automated tools. \n\nThese details may be used as an additional layer to verify the current security posture of an organization against latest cyber trends.",
          "modified": "2025-05-04T07:02:31.627000",
          "created": "2025-04-04T07:31:25.772000",
          "tags": [
            "mozi",
            "germany",
            "india",
            "china",
            "grouped",
            "vietnam",
            "united kingdom",
            "singapore",
            "week",
            "group",
            "indonesia",
            "clearfake",
            "asyncrat",
            "stealc",
            "smartloader",
            "mexico",
            "remcos",
            "malware",
            "date",
            "belarus",
            "ukraine",
            "amadey",
            "lockbit",
            "linux",
            "superblack",
            "akira"
          ],
          "references": [
            "https://urlhaus.abuse.ch/",
            "https://any.run/malware-trends/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Linux",
              "display_name": "Linux",
              "target": null
            },
            {
              "id": "SuperBlack",
              "display_name": "SuperBlack",
              "target": null
            },
            {
              "id": "Akira",
              "display_name": "Akira",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [
            "Cryptocurrency"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "aa00643640@techmahindra.com",
            "id": "156540",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 91,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 51,
            "FileHash-SHA256": 117,
            "domain": 62,
            "hostname": 114
          },
          "indicator_count": 486,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 105,
          "modified_text": "350 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://any.run/malware-trends/",
        "https://urlhaus.abuse.ch/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Lockbit",
            "Linux",
            "Akira",
            "Superblack"
          ],
          "industries": [
            "Cryptocurrency"
          ],
          "unique_indicators": 801
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/loglink9.site",
    "whois": "http://whois.domaintools.com/loglink9.site",
    "domain": "loglink9.site",
    "hostname": "wk3699.loglink9.site"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "67ef8acdfe632a32bd164cbc",
      "name": "Threat Intel Report - W11-2025",
      "description": "These are weekly base recommendations to all IT Administrators and CISOs to take corrective actions to upgrade their security infrastructure against newly identified threats and attacks in this week. \n\nSecurity is a continuous process, and it has to be reviewed and audited on a continuous manner through manual or automated tools. \n\nThese details may be used as an additional layer to verify the current security posture of an organization against latest cyber trends.",
      "modified": "2025-05-04T07:02:31.627000",
      "created": "2025-04-04T07:31:25.772000",
      "tags": [
        "mozi",
        "germany",
        "india",
        "china",
        "grouped",
        "vietnam",
        "united kingdom",
        "singapore",
        "week",
        "group",
        "indonesia",
        "clearfake",
        "asyncrat",
        "stealc",
        "smartloader",
        "mexico",
        "remcos",
        "malware",
        "date",
        "belarus",
        "ukraine",
        "amadey",
        "lockbit",
        "linux",
        "superblack",
        "akira"
      ],
      "references": [
        "https://urlhaus.abuse.ch/",
        "https://any.run/malware-trends/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Linux",
          "display_name": "Linux",
          "target": null
        },
        {
          "id": "SuperBlack",
          "display_name": "SuperBlack",
          "target": null
        },
        {
          "id": "Akira",
          "display_name": "Akira",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [
        "Cryptocurrency"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "aa00643640@techmahindra.com",
        "id": "156540",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 91,
        "FileHash-MD5": 51,
        "FileHash-SHA1": 51,
        "FileHash-SHA256": 117,
        "domain": 62,
        "hostname": 114
      },
      "indicator_count": 486,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 105,
      "modified_text": "350 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://wk3699.loglink9.site/bin/support.client...",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://wk3699.loglink9.site/bin/support.client...",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776606142.1146328
}