{
	"id": "b652cfc9-6eb1-4868-9f52-412a53d57b57",
	"created_at": "2026-04-06T01:31:56.874241Z",
	"updated_at": "2026-04-10T13:11:47.687857Z",
	"deleted_at": null,
	"sha1_hash": "056d322e0c043dba0a270d41825f22886cc15313",
	"title": "Redirecting...",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 16454,
	"plain_text": "SQLSTATE[HY093]: Invalid parameter number: number of bound variables does not match number of\r\ntokens\r\nhttps://systemweakness.com/investigating-a-fake-mobile-payment-smishing-that-abuses-duck-dns-d07c72468ba8\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://systemweakness.com/investigating-a-fake-mobile-payment-smishing-that-abuses-duck-dns-d07c72468ba8"
	],
	"report_names": [
		"investigating-a-fake-mobile-payment-smishing-that-abuses-duck-dns-d07c72468ba8"
	],
	"threat_actors": [],
	"ts_created_at": 1775439116,
	"ts_updated_at": 1775826707,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/056d322e0c043dba0a270d41825f22886cc15313.pdf",
		"text": "https://archive.orkl.eu/056d322e0c043dba0a270d41825f22886cc15313.txt",
		"img": "https://archive.orkl.eu/056d322e0c043dba0a270d41825f22886cc15313.jpg"
	}
}