Home / Industry

Uncloaking the Underbelly of JinxLoader

Cybercriminals are known for using so-called “loaders” like Xloader to initiate computer infections. Worse, even newbies can now get their hands on these malware distributors via hacker forums. Case in point? JinxLoader, one of the latest malicious offerings up for grabs on the likes of hackforums[.]net.

Palo Alto’s Unit 42 published 19 JinxLoader indicators of compromise (IoCs) comprising 18 domains and one IP address in late November 2023. The WhoisXML API research team sought to determine if the JinxLoader operators left more digital traces through a DNS deep dive that brought to light:

  • 314 email-connected domains
  • 158 IP-connected domains, one of which turned out to be malicious
  • 1,116 string-connected domains, one of which turned out to be malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Behind the JinxLoader IoCs

As with every investigation, we sought to discover more about the 21 JinxLoader IoCs starting with a bulk WHOIS lookup for the 18 domains that led to these findings:

  • The 18 domains identified as IoCs were distributed among 12 registrars led by Namecheap, Inc., which accounted for three domains. Hostinger Operations UAB and NameSilo LLC tied in second place with two domains each. One domain each was administered by Chengdu West Dimension Digital Technology Co. Ltd.; Domain International Services Limited; Dynadot LLC; Eranet International Limited; GMO Internet, Inc.; Gname.com Pte. Ltd.; IONOS SE; Name.com, Inc.; and Network Solutions LLC. The remaining two did not have current registrar data.
  • Although a majority of the domain IoCs were relatively new—created in 2023, one was aged, created way back in 2005. Two, however, did not have creation dates in their current WHOIS records.
  • The 18 domains were spread across six registrant countries topped by the U.S., which accounted for six of them. China and Iceland took the second spot with three domains each while the U.K. with two domains placed third. Japan and Singapore accounted for one domain each. Finally, two did not have current registrant country information.

  • It is also worth noting that two of the domain IoCs—e3iaibr[.]icu and ldhqi4[.]fun—had registrant organizations in their current WHOIS records although they looked more like individual names.

An IP geolocation lookup, meanwhile, for the IP address classified as an IoC showed it was geolocated in Japan with Alibaba (U.S.) Technology Co. Ltd. as its ISP.

In Search of JinxLoader DNS Connections

We began our search for JinxLoader traces in the DNS with WHOIS History API searches for email addresses. We found 41 results after duplicates and the IoCs were removed. Seven of the email addresses were public.

Reverse WHOIS API searches showed that three of the public email addresses appeared in the current WHOIS records of 314 other domains after duplicates and the IoCs were filtered out.

Screenshot API searches for the 314 email-connected domains revealed that 115 remained accessible to date.

Next, we subjected the 18 domain IoCs to DNS lookups, which showed that 17 actively resolved to 26 IP addresses after duplicates and the IoC were removed.

IP geolocation lookups for the 26 additional IP addresses led to these findings:

  • The U.S. topped the list of geolocation countries, accounting for 16 IP addresses. China and Germany took the second spot with three IP addresses each. The remaining four were scattered across the same number of nations—the British Virgin Islands, Hungary, Japan, and Lithuania.

    Note that Japan, an IP address IoC geolocation country, also appeared as an origin of one additional IP address.

  • Half of the additional IP addresses, 13 to be exact, were administered by Amazon. Namecheap, Inc. accounted for four IP addresses. One each fell under the dominion of Confluence Networks, Inc.; DingFeng XinHui (Hong Kong) Technology Limited; Gigabit Solution Limited; GMO Internet, Inc.; Hetzner Online GmbH; Hostinger International Limited; Juraj Pusic; Peg Tech, Inc., and SEDO GmbH.

Threat intelligence lookups for the 26 additional IP addresses revealed that 14 were associated with various threats. Take a look at the detailed results for five of them below.


Reverse IP lookups for the 26 additional IP addresses showed that five of them could be dedicated. They hosted 158 unique domains that were not part of the list of IoCs or email-connected domains.

Threat Intelligence API, meanwhile, revealed that one—echolinkevolve[.]xyz—was seemingly associated with malware distribution.

Screenshot of malicious IP-connected domain echolinkevolve[.]xyz

Screenshot API showed that 72 of the 158 IP-connected domains remained accessible. It is also worth noting that 12 of them looked quite suspicious—brightpathtechgroups[.]top, frontiersunrisepro[.]life, greensagesstrategies[.]top, ivisas-affaires[.]com, mailerpay[.]com, matrixleapsystems[.]xyz, nexusglobalfusions[.]top, oceanicpulsetek[.]xyz, pbc-finance[.]com, solarflaredisruptors[.]life, trebletech[.]xyz, and visionquestengage[.]life—in that they shared the same content as malicious IP-connected domain echolinkevolve[.]xyz.

To cover all our bases, we used Domains & Subdomains Discovery with the Starts with parameter to look for other possibly connected domains, specifically those containing text strings found among the IoCs. We uncovered 1,116 such properties for eight strings, namely:

  • 219855.
  • austintrafficlawyer
  • infinite-7
  • overthemoonphoto
  • terranovaservices
  • vietdot
  • wgs.
  • worldlife

Threat Intelligence API showed that one string-connected domain—worldlifefree[.]info—was associated with malicious command-and-control (C&C) and malware distribution.

Screenshot API, meanwhile, showed that 472 of the 1,116 string-connected domains remained accessible as of this writing.

Our foray into the DNS for more signs of JinxLoader led to the discovery of 1,588 potentially connected artifacts. We also uncovered 26 additional IP addresses that played host to the domain IoCs, several of which turned out to be malicious. A couple of the connected domains were also associated with various threats.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under


Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Co-designer of the TCP/IP Protocols & the Architecture of the Internet



IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC


Sponsored byDNIB.com

Domain Names

Sponsored byVerisign


Sponsored byVerisign