# Copyright (c) 2014-2019 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://www.symantec.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions

win7-update.com

# Reference: https://twitter.com/clearskysec/status/976170940722708480

j-alam.com
win10-update.com
dnrslv.gq
skf-group.info
yjksdrl.tk
eseses.tk
jevxvideo.com
dnmails.gq
microsoftcert.xyz

# Reference: https://unit42.paloaltonetworks.com/new-python-based-payload-mechaflounder-used-by-chafer/

http://134.119.217.87
http://185.177.59.70 
turkiyeburslari.tk 
xn--mgbfv9eh74d.com 
ytb.services

# Reference: https://twitter.com/VK_Intel/status/1093001266974916608

mycrossweb.com
offsetweb.com

# Reference: https://twitter.com/VK_Intel/status/1074910586423648256

dropboxengine.com
