# Copyright (c) 2014-2021 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html

panasocin.com
totalpople.info
yasonbin.info
em.totalpople.info
gstrap.jkub.com
office.panasocin.com
woc.yasonbin.info

# Reference: https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/

amazon.panasocin.com
office.panasocin.com
okinawas.ssl443.org

# Reference: https://otx.alienvault.com/pulse/5db0438c08e53c4d7931e3f4

update.panasocin.com

# Reference: https://twitter.com/8th_grey_owl/status/1262047338006065155

harb.bbsindex.com

# Reference: https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/

inkeslive.com
rutentw.com
web2008.rutentw.com
wg1.inkeslive.com

# Reference: https://twitter.com/BushidoToken/status/1446602218170376199

centosupdates.com
centosupdate.dynamic-dns.net
centrosupdate.proxydns.com
update.centosupdates.com
