# Copyright (c) 2014-2026 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: chrysalis, warbird, hacked notepad++

# Reference: https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/operation-lotus-blossom/unit42-operation-lotus-blossom.pdf

asean-star.com
aseaneco.org
aseansec.dynalias.org
beckhammer.xicp.net
boshman09.com
chris201.net
cpcl2006.dyndns-free.com
cybertunnel.dyndns.info
harryleed.dyndns.org
jackyson.dyndns.info
kid.dyndns.org
kjd.dyndns.org
newinfo32.eicp.net
newshappys.dyndns-blog.com
petto.mooo.com
phil-army.gotdns.org
phil-gov.gotdns.org
scristioned.dyndns-web.com
shotacon.dyndns.info
usa-moon.net
verolalia.dyndns.org
wsi.dyndns.org
aliancesky.com
babysoal.com
boshman09.com
chris201.net
iascas.net
imonju.com
imonju.net
interhero.net
seachers.net
serchers.net
tgecc.org
tintuchoahau.com
vienclp.com
www3.bkav2010.net

# Reference: https://www.accenture.com/t20180131T100734Z__w__/us-en/_acnmedia/PDF-46/Accenture-Security-Elise-Threat-Analysis.pdf

3qyo4o7.7r7i3.info
dtdf5vu.nt7yq.info
j.4tc3ldw.g9ml.www0.org
38qmk6.0to9.info
ubkv1t.ec0.com
7g91xhp.envuy3.net
l.hovux.eln9wj7.7gpj.org
w.7sytdjc.wroi.cxy.com

# Reference: https://x.com/cyb3rops/status/2018253965645766993
# Reference: https://x.com/cyb3rops/status/2018361184626356411
# Reference: https://x.com/ValidinLLC/status/2018680305364685102
# Reference: https://notepad-plus-plus.org/news/hijacked-incident-info-update/
# Reference: https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
# Reference: https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
# Reference: https://securelist.com/notepad-supply-chain-attack/118708/
# Reference: https://www.virustotal.com/gui/ip-address/160.250.93.48/relations
# Reference: https://www.virustotal.com/gui/file/e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda/detection
# Reference: https://www.virustotal.com/gui/file/0755d2dc99c0a44f4e5435c398d9afca0db783e51a9df9ea472ac6936384d0d8/detection
# Reference: https://www.virustotal.com/gui/file/0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd/detection
# Reference: https://www.virustotal.com/gui/file/7f2e0f51e83d6cf9c50922f898126b139f69cc49e8768830042358c1bd336dbc/detection
# Reference: https://www.virustotal.com/gui/file/f365cfbca03a28a7692308c9766f8ae92f74f6c79aaa68458b1facbc74b534f2/detection
# Reference: https://www.virustotal.com/gui/file/b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3/detection
# Reference: https://www.virustotal.com/gui/file/fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a/detection

http://45.32.144.255
http://45.76.155.202
http://95.179.213.0
124.222.137.114:9999
59.110.7.32:8880
59.110.7.32:8999
95.179.213.0:443
95.179.213.0:8080
cloudtrafficservice.com
skycloudcenter.com
wiresguard.com
api.cloudtrafficservice.com
api.skycloudcenter.com
api.wiresguard.com
cdncheck.it.com
# link-dns.it.com
safe-dns.it.com
self-dns.it.com
/ukalDxyz
