# Copyright (c) 2014-2021 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: ficker stealer, merkava

# Reference: https://twitter.com/malwrhunterteam/status/1330249483045785604
# Reference: https://www.virustotal.com/gui/file/3b1dc7e0c9154fe384c695f8eec5622ab2ba88bf59d990def6b2c11d8519cecf/detection

45.90.218.220:8000
tracker-place.top

# Reference: https://www.domaintools.com/resources/blog/identifying-network-infrastructure-related-to-a-who-spoofing-campaign
# Reference: https://otx.alienvault.com/pulse/5fc7b50f3599afc7ab4cc5a7

adverting-cdn.com
european-who.com
health-world-org.com
office-pulgin.com
who-international.com

# Reference: https://twitter.com/anyrun_app/status/1338471840902213635
# Reference: https://app.any.run/tasks/44cd1390-8ea7-414f-9d8c-d24668623f5a/

brokstrot.com
