ID RST:8D76B421-3AE7-37B5-9A3C-96242859481E Type rst Reporter RST Threat Feed Modified 2020-05-17T00:00:00
Description
Found automatics[.]infopay-orders.secondhandedserenade.com in RST Threat Feed with score 20.
First seen: 2020-05-17T03:00:00, Last seen: 2020-11-03T03:00:00.
IOC tags: malware. and CNAME records: sinkhole.paloaltonetworks.com.
Whois:
Created: 2020-03-23 18:06:54,
Registrar: Google LLC,
Registrant: unknown.
IOC could be a False Positive (Domain not resolved, but Whois records found).
https://rstcloud.net/
{"id": "RST:8D76B421-3AE7-37B5-9A3C-96242859481E", "bulletinFamily": "ioc", "title": "RST Threat feed. IOC: automatics.infopay-orders.secondhandedserenade.com", "description": "Found **automatics[.]infopay-orders.secondhandedserenade.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2020-05-17T03:00:00, Last seen: 2020-11-03T03:00:00.\n IOC tags: **malware**. and CNAME records: sinkhole.paloaltonetworks.com.\nWhois:\n Created: 2020-03-23 18:06:54, \n Registrar: Google LLC, \n Registrant: unknown.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "published": "2020-11-04T00:00:00", "modified": "2020-05-17T00:00:00", "cvss": {}, "href": "", "reporter": "RST Threat Feed", "references": [], "cvelist": [], "type": "rst", "lastseen": "2020-11-03T00:00:00", "edition": 1, "viewCount": 0, "enchantments": {"vulnersScore": "PENDING"}, "iocType": "domain", "ip": [], "domain": ["automatics.infopay-orders.secondhandedserenade.com"], "url": [], "iocScore": {"ioc_frequency": 0.17, "ioc_src": 68.35, "ioc_tags": 0.89, "ioc_total": 20.0}, "tags": ["malware"], "fp": {"alarm": "possible", "descr": "Domain not resolved, but Whois records found"}, "whois": {}, "geodata": {}, "asn": {}, "threat": []}