# Copyright (c) 2014-2021 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://malware.news/t/lammers-stealers-and-rats-same-technics-like-formbook-malware-to-install-jrat-and-hawkeye/21919

indigo2.publicvm.com
nandos777.ddns.net
netwokers.ddns.net
gray7.serveftp.com
cryoutlouds.dynu.net
dengsman.duckdns.org
realwire123.ddns.net
cryoutloud.dynu.net
audreysaradin.no-ip.org
evansabide24.ddns.net

# Reference: https://www.virustotal.com/gui/file/a890acc9b1eef4c003a004f2e69de19eaa0bbdcd543579da605c63ea5e51cc32/detection

79.134.225.72:1819

# Reference: https://www.virustotal.com/gui/file/af98b75861c35316e855b27a866cf24e3f27645250a37bc3f7cbaa38d62c8bf5/detection

79.134.225.72:33440

# Reference: https://www.virustotal.com/gui/file/c8be4ea82b3c7ca8df79f48f0aaab706b60b3507f3add67d1f05d1f908e18f0e/detection

79.134.225.72:8877

# Reference: https://www.virustotal.com/gui/file/23488b8f8008a7473d40119201b83d35ed8ddd1812f8c16076d1f2307cb8632e/detection

expressjokes.mywire.org
