{
  "type": "Domain",
  "indicator": "timer.global",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/timer.global",
    "alexa": "http://www.alexa.com/siteinfo/timer.global",
    "indicator": "timer.global",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3415794588,
      "indicator": "timer.global",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "624ade33b2dd93cdc7ef4b58",
          "name": "Botnet c&c",
          "description": "ParallelAxisIndex:0,label:1,lineStyle:2,inactiveOpacity: 1.05,m.g,graphicKey: m.style,t.",
          "modified": "2022-04-04T12:01:54.999000",
          "created": "2022-04-04T12:01:54.999000",
          "tags": [
            "datav6a0cc948",
            "pingfang sc",
            "microsoft yahei",
            "helvetica neue",
            "helvetica",
            "hiragino sans",
            "arial",
            "datav11c9d7e6",
            "datava3f4887a",
            "datav12834d8c",
            "span",
            "open",
            "date",
            "function",
            "typeof t",
            "regexp",
            "number",
            "typeof e",
            "null",
            "width",
            "typeof s",
            "error",
            "this",
            "class",
            "accept",
            "d mmmm",
            "yyyy",
            "yyyy hh",
            "llll",
            "pjh5",
            "dddd",
            "ds5p",
            "void",
            "android",
            "backspace",
            "typeof define",
            "load",
            "mika tuupola",
            "boolean"
          ],
          "references": [
            "https://cdf5cxngkkxd.com/#/home",
            "https://cdf5cxngkkxd.com/static/js/lazyload.min.js",
            "https://cdf5cxngkkxd.com/static/js/manifest.e4d52d2f9dae6cd41eb4.js",
            "https://cdf5cxngkkxd.com/static/js/vendor.084bf9e0e16f0b2b6faa.js",
            "https://cdf5cxngkkxd.com/static/js/app.e16f8acb87917d3eab20.js",
            "https://cdf5cxngkkxd.com/static/css/app.7b16cc13d7ec8824766fa8255c64a800.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 334,
            "URL": 1182,
            "domain": 214,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://cdf5cxngkkxd.com/static/js/vendor.084bf9e0e16f0b2b6faa.js",
        "https://cdf5cxngkkxd.com/static/js/app.e16f8acb87917d3eab20.js",
        "https://cdf5cxngkkxd.com/static/js/manifest.e4d52d2f9dae6cd41eb4.js",
        "https://cdf5cxngkkxd.com/static/js/lazyload.min.js",
        "https://cdf5cxngkkxd.com/static/css/app.7b16cc13d7ec8824766fa8255c64a800.css",
        "https://cdf5cxngkkxd.com/#/home"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "65708aa1dca4e6c505e4fc9e",
      "name": "Botnet c&c",
      "description": "",
      "modified": "2023-12-06T14:52:16.286000",
      "created": "2023-12-06T14:52:16.286000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 214,
        "hostname": 334,
        "URL": 1182,
        "FileHash-SHA256": 33
      },
      "indicator_count": 1763,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "624ade33b2dd93cdc7ef4b58",
      "name": "Botnet c&c",
      "description": "ParallelAxisIndex:0,label:1,lineStyle:2,inactiveOpacity: 1.05,m.g,graphicKey: m.style,t.",
      "modified": "2022-04-04T12:01:54.999000",
      "created": "2022-04-04T12:01:54.999000",
      "tags": [
        "datav6a0cc948",
        "pingfang sc",
        "microsoft yahei",
        "helvetica neue",
        "helvetica",
        "hiragino sans",
        "arial",
        "datav11c9d7e6",
        "datava3f4887a",
        "datav12834d8c",
        "span",
        "open",
        "date",
        "function",
        "typeof t",
        "regexp",
        "number",
        "typeof e",
        "null",
        "width",
        "typeof s",
        "error",
        "this",
        "class",
        "accept",
        "d mmmm",
        "yyyy",
        "yyyy hh",
        "llll",
        "pjh5",
        "dddd",
        "ds5p",
        "void",
        "android",
        "backspace",
        "typeof define",
        "load",
        "mika tuupola",
        "boolean"
      ],
      "references": [
        "https://cdf5cxngkkxd.com/#/home",
        "https://cdf5cxngkkxd.com/static/js/lazyload.min.js",
        "https://cdf5cxngkkxd.com/static/js/manifest.e4d52d2f9dae6cd41eb4.js",
        "https://cdf5cxngkkxd.com/static/js/vendor.084bf9e0e16f0b2b6faa.js",
        "https://cdf5cxngkkxd.com/static/js/app.e16f8acb87917d3eab20.js",
        "https://cdf5cxngkkxd.com/static/css/app.7b16cc13d7ec8824766fa8255c64a800.css"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 334,
        "URL": 1182,
        "domain": 214,
        "FileHash-SHA256": 33
      },
      "indicator_count": 1763,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1476 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "timer.global",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "timer.global",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776671163.55481
}