{
  "type": "Domain",
  "indicator": "llhdata.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/llhdata.com",
    "alexa": "http://www.alexa.com/siteinfo/llhdata.com",
    "indicator": "llhdata.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3759604564,
      "indicator": "llhdata.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 10,
      "pulses": [
        {
          "id": "655076c123a5ab86eb0c8a34",
          "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
          "description": "",
          "modified": "2023-12-12T06:03:08.751000",
          "created": "2023-11-12T06:54:57.966000",
          "tags": [
            "unknown",
            "as8075",
            "united",
            "nxdomain",
            "a nxdomain",
            "asnone country",
            "search",
            "domain",
            "creation date",
            "scan endpoints",
            "date",
            "new zealand",
            "ns nxdomain",
            "aaaa nxdomain",
            "asnone united",
            "cname",
            "asnone",
            "soa nxdomain",
            "australia",
            "status hostname",
            "domains show",
            "domain related",
            "entrie",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "whois whois",
            "referrer",
            "communicating",
            "siblings",
            "moth callback",
            "threat roundup",
            "june",
            "record type",
            "ttl value",
            "server",
            "privacy billing",
            "redacted for",
            "privacy admin",
            "postal code",
            "email",
            "admin email",
            "stateprovince",
            "city",
            "code",
            "pty ltd",
            "registrar abuse",
            "wholesale pty",
            "tpp wholesale",
            "registrar url",
            "execution",
            "contacted",
            "malware",
            "IPv4 13.75.251.189 scanning_host",
            "scanning_host",
            "phishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3487,
            "domain": 1111,
            "email": 7,
            "hostname": 1368,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 102,
            "FileHash-SHA256": 663
          },
          "indicator_count": 6840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "859 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655076c8f26b8ab3f641f4ae",
          "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
          "description": "",
          "modified": "2023-12-12T06:03:08.751000",
          "created": "2023-11-12T06:55:04.517000",
          "tags": [
            "unknown",
            "as8075",
            "united",
            "nxdomain",
            "a nxdomain",
            "asnone country",
            "search",
            "domain",
            "creation date",
            "scan endpoints",
            "date",
            "new zealand",
            "ns nxdomain",
            "aaaa nxdomain",
            "asnone united",
            "cname",
            "asnone",
            "soa nxdomain",
            "australia",
            "status hostname",
            "domains show",
            "domain related",
            "entrie",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "whois whois",
            "referrer",
            "communicating",
            "siblings",
            "moth callback",
            "threat roundup",
            "june",
            "record type",
            "ttl value",
            "server",
            "privacy billing",
            "redacted for",
            "privacy admin",
            "postal code",
            "email",
            "admin email",
            "stateprovince",
            "city",
            "code",
            "pty ltd",
            "registrar abuse",
            "wholesale pty",
            "tpp wholesale",
            "registrar url",
            "execution",
            "contacted",
            "malware",
            "IPv4 13.75.251.189 scanning_host",
            "scanning_host",
            "phishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3487,
            "domain": 1111,
            "email": 7,
            "hostname": 1368,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 102,
            "FileHash-SHA256": 663
          },
          "indicator_count": 6840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "859 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a67da62bb520508659a5",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:51:09.511000",
          "created": "2023-12-06T16:51:09.511000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a67567202b93ee502ff7",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:51:00.527000",
          "created": "2023-12-06T16:51:00.527000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a66d9992e6957b2d1415",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:50:53.855000",
          "created": "2023-12-06T16:50:53.855000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a667be1f5233855ae115",
          "name": "Play Ransomware",
          "description": "",
          "modified": "2023-12-06T16:50:47.344000",
          "created": "2023-12-06T16:50:47.344000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "hostname": 1520,
            "domain": 1023,
            "URL": 4595,
            "FileHash-SHA1": 43,
            "FileHash-MD5": 41
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5300c7fbb0ebe0aad3",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:08:51.070000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "906 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5622544406ab139161",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:08:53.825000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "906 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a5d65c4b99d76421b48",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:09:01.502000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "906 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65133a60be1d9162d87c5e93",
          "name": "Play Ransomware",
          "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
          "modified": "2023-10-26T19:03:33.397000",
          "created": "2023-09-26T20:09:04.704000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "referrer",
            "subdomains",
            "resolutions",
            "communicating",
            "contacted",
            "llwn",
            "threat roundup",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "play ransomware",
            "ursnif",
            "malware"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan/Banker.AndroidOS.bzd",
              "display_name": "Trojan/Banker.AndroidOS.bzd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1064,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 43,
            "domain": 1023,
            "hostname": 1520,
            "URL": 4595
          },
          "indicator_count": 8286,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "906 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Malware",
            "Trojan/banker.androidos.bzd"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 10,
  "pulses": [
    {
      "id": "655076c123a5ab86eb0c8a34",
      "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
      "description": "",
      "modified": "2023-12-12T06:03:08.751000",
      "created": "2023-11-12T06:54:57.966000",
      "tags": [
        "unknown",
        "as8075",
        "united",
        "nxdomain",
        "a nxdomain",
        "asnone country",
        "search",
        "domain",
        "creation date",
        "scan endpoints",
        "date",
        "new zealand",
        "ns nxdomain",
        "aaaa nxdomain",
        "asnone united",
        "cname",
        "asnone",
        "soa nxdomain",
        "australia",
        "status hostname",
        "domains show",
        "domain related",
        "entrie",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "whois whois",
        "referrer",
        "communicating",
        "siblings",
        "moth callback",
        "threat roundup",
        "june",
        "record type",
        "ttl value",
        "server",
        "privacy billing",
        "redacted for",
        "privacy admin",
        "postal code",
        "email",
        "admin email",
        "stateprovince",
        "city",
        "code",
        "pty ltd",
        "registrar abuse",
        "wholesale pty",
        "tpp wholesale",
        "registrar url",
        "execution",
        "contacted",
        "malware",
        "IPv4 13.75.251.189 scanning_host",
        "scanning_host",
        "phishing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3487,
        "domain": 1111,
        "email": 7,
        "hostname": 1368,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 102,
        "FileHash-SHA256": 663
      },
      "indicator_count": 6840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "859 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "655076c8f26b8ab3f641f4ae",
      "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
      "description": "",
      "modified": "2023-12-12T06:03:08.751000",
      "created": "2023-11-12T06:55:04.517000",
      "tags": [
        "unknown",
        "as8075",
        "united",
        "nxdomain",
        "a nxdomain",
        "asnone country",
        "search",
        "domain",
        "creation date",
        "scan endpoints",
        "date",
        "new zealand",
        "ns nxdomain",
        "aaaa nxdomain",
        "asnone united",
        "cname",
        "asnone",
        "soa nxdomain",
        "australia",
        "status hostname",
        "domains show",
        "domain related",
        "entrie",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "whois whois",
        "referrer",
        "communicating",
        "siblings",
        "moth callback",
        "threat roundup",
        "june",
        "record type",
        "ttl value",
        "server",
        "privacy billing",
        "redacted for",
        "privacy admin",
        "postal code",
        "email",
        "admin email",
        "stateprovince",
        "city",
        "code",
        "pty ltd",
        "registrar abuse",
        "wholesale pty",
        "tpp wholesale",
        "registrar url",
        "execution",
        "contacted",
        "malware",
        "IPv4 13.75.251.189 scanning_host",
        "scanning_host",
        "phishing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3487,
        "domain": 1111,
        "email": 7,
        "hostname": 1368,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 102,
        "FileHash-SHA256": 663
      },
      "indicator_count": 6840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "859 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a67da62bb520508659a5",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:51:09.511000",
      "created": "2023-12-06T16:51:09.511000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a67567202b93ee502ff7",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:51:00.527000",
      "created": "2023-12-06T16:51:00.527000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a66d9992e6957b2d1415",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:50:53.855000",
      "created": "2023-12-06T16:50:53.855000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a667be1f5233855ae115",
      "name": "Play Ransomware",
      "description": "",
      "modified": "2023-12-06T16:50:47.344000",
      "created": "2023-12-06T16:50:47.344000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "hostname": 1520,
        "domain": 1023,
        "URL": 4595,
        "FileHash-SHA1": 43,
        "FileHash-MD5": 41
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65133a5300c7fbb0ebe0aad3",
      "name": "Play Ransomware",
      "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
      "modified": "2023-10-26T19:03:33.397000",
      "created": "2023-09-26T20:08:51.070000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "referrer",
        "subdomains",
        "resolutions",
        "communicating",
        "contacted",
        "llwn",
        "threat roundup",
        "family",
        "roots",
        "lolkek",
        "tzw variants",
        "play ransomware",
        "ursnif",
        "malware"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan/Banker.AndroidOS.bzd",
          "display_name": "Trojan/Banker.AndroidOS.bzd",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 41,
        "FileHash-SHA1": 43,
        "domain": 1023,
        "hostname": 1520,
        "URL": 4595
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "906 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65133a5622544406ab139161",
      "name": "Play Ransomware",
      "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
      "modified": "2023-10-26T19:03:33.397000",
      "created": "2023-09-26T20:08:53.825000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "referrer",
        "subdomains",
        "resolutions",
        "communicating",
        "contacted",
        "llwn",
        "threat roundup",
        "family",
        "roots",
        "lolkek",
        "tzw variants",
        "play ransomware",
        "ursnif",
        "malware"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan/Banker.AndroidOS.bzd",
          "display_name": "Trojan/Banker.AndroidOS.bzd",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 41,
        "FileHash-SHA1": 43,
        "domain": 1023,
        "hostname": 1520,
        "URL": 4595
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "906 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65133a5d65c4b99d76421b48",
      "name": "Play Ransomware",
      "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
      "modified": "2023-10-26T19:03:33.397000",
      "created": "2023-09-26T20:09:01.502000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "referrer",
        "subdomains",
        "resolutions",
        "communicating",
        "contacted",
        "llwn",
        "threat roundup",
        "family",
        "roots",
        "lolkek",
        "tzw variants",
        "play ransomware",
        "ursnif",
        "malware"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan/Banker.AndroidOS.bzd",
          "display_name": "Trojan/Banker.AndroidOS.bzd",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 41,
        "FileHash-SHA1": 43,
        "domain": 1023,
        "hostname": 1520,
        "URL": 4595
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "906 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65133a60be1d9162d87c5e93",
      "name": "Play Ransomware",
      "description": "Malicious. Various unknown, unauthorized clouds set up on a device.",
      "modified": "2023-10-26T19:03:33.397000",
      "created": "2023-09-26T20:09:04.704000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "referrer",
        "subdomains",
        "resolutions",
        "communicating",
        "contacted",
        "llwn",
        "threat roundup",
        "family",
        "roots",
        "lolkek",
        "tzw variants",
        "play ransomware",
        "ursnif",
        "malware"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan/Banker.AndroidOS.bzd",
          "display_name": "Trojan/Banker.AndroidOS.bzd",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1064,
        "FileHash-MD5": 41,
        "FileHash-SHA1": 43,
        "domain": 1023,
        "hostname": 1520,
        "URL": 4595
      },
      "indicator_count": 8286,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "906 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "llhdata.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "llhdata.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776647660.0860682
}