# Copyright (c) 2014-2023 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: blackbytent ransomware

# Reference: https://github.com/thetanz/ransomwatch/blob/main/docs/INDEX.md

6iaj3efye3q62xjgfxyegrufhewxew7yt4scxjd45tlfafyja6q4ctqd.onion
f5uzduboq4fa2xkjloprmctk7ve3dm46ff7aniis66cbekakvksxgeqd.onion

# Reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/
# Reference: https://otx.alienvault.com/pulse/616d438afb150f61aaa17eca

http://45.9.148.114

# Reference: https://www.zscaler.com/blogs/security-research/analysis-blackbyte-ransomwares-go-based-variants
# Reference: https://otx.alienvault.com/pulse/62729a7f856828d9110d4d47

7oukjxwkbnwyg7cekudzp66okrchbuubde2j3h6fkpis6izywoj2eqad.onion

# Reference: https://research.nccgroup.com/2022/07/13/climbing-mount-everest-black-byte-bytes-back/
# Reference: https://otx.alienvault.com/pulse/62d00411f49bfb5dd2362e88

18.193.71.144:10443
3.22.79.23:10443
3.22.79.23:8080
45.84.0.164:10443

# Reference: https://twitter.com/cyb3rops/status/1639030126577942529
# Reference: https://twitter.com/splinter_code/status/1642970055519399936
# Reference: https://tria.ge/230321-wnvzsscd27/behavioral2

a2dbso6dijaqsmut36r6y4nps4cwivmfog5bpzf6uojovce6f3gl36id.onion
jbeg2dct2zhku6c2vwnpxtm2psnjo2xnqvvpoiiwr5hxnc6wrp3uhnad.onion
tre7npfj65g4pxvjr2qyqwqkpo4heemj7ysgr6mtlf3rihgfradyjvad.onion
