# Copyright (c) 2014-2021 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: danbot, hexane, lyceum

# Reference: https://twitter.com/blackorbird/status/1166345000826724352
# Reference: https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign
# Reference: https://otx.alienvault.com/pulse/5d656065aaa9ac9b19ef75c2
# Reference: https://twitter.com/Manu_De_Lucia/status/1208388233731678208
# Reference: https://medium.com/@Manu_De_Lucia/exploding-the-danbot-code-to-hunt-for-hexanes-cyber-weapon-3d466775f480
# Reference: https://www.virustotal.com/gui/file/11c52732d7fde12f5f4c6431f8be876ffd73acdd725c4b908b257be1b007a290/detection

bsolutions-cloude.com
cybersecnet.co.za
cybersecnet.org
dnscachecloud.com
dnscloudservice.com
excsrvcdn.com
online-analytic.com
opendnscloud.com
web-statistics.info
web-traffic.info

# Reference: https://twitter.com/h2jazi/status/1372543666909220873
# Reference: https://www.virustotal.com/gui/file/8bd23bbab513e03ea1eb2adae09f56b08c53cacd2a3e8134ded5ef8a741a12a5/detection
# Reference: https://www.virustotal.com/gui/file/4e70df688e8d824008cc08e1d05f84bb8eccef1856ecabcbf0228efa87adb129/detection
# Reference: https://www.virustotal.com/gui/file/9ed939f56eb04fb40c9a0ce6f3a4fe8045619eeab1d0d378a2431578c0a2ca23/detection
# Reference: https://www.virustotal.com/gui/file/9eca74b1fef65ac41d28f7ada626eec1e1a9fe8b9285943d72d43b87e81f8a7e/detection
# Reference: https://www.virustotal.com/gui/file/a02db59312f14aa8208c462e0e5b3d3de33dd3018dae150417daffc2216903da/detection

stgeorgebankers.com
