# Copyright (c) 2014-2020 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: danbot, hexane, lyceum

# Reference: https://twitter.com/blackorbird/status/1166345000826724352
# Reference: https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign
# Reference: https://otx.alienvault.com/pulse/5d656065aaa9ac9b19ef75c2
# Reference: https://twitter.com/Manu_De_Lucia/status/1208388233731678208
# Reference: https://medium.com/@Manu_De_Lucia/exploding-the-danbot-code-to-hunt-for-hexanes-cyber-weapon-3d466775f480
# Reference: https://www.virustotal.com/gui/file/11c52732d7fde12f5f4c6431f8be876ffd73acdd725c4b908b257be1b007a290/detection

bsolutions-cloude.com
cybersecnet.co.za
cybersecnet.org
dnscachecloud.com
dnscloudservice.com
excsrvcdn.com
online-analytic.com
opendnscloud.com
web-statistics.info
web-traffic.info
