date,country,md5,c2,family,target,reference 2012-01-01,SY,41a2159b94c6883f03d2d901428a5891,216.6.0.28,XtremeRAT,,https://www.f-secure.com/weblog/archives/00002356.html 2012-01-01,SY,fb6e419e0fd9c2f39be43bcadbd2879f,216.6.0.24,XtremeRAT,,https://www.f-secure.com/weblog/archives/00002356.html 2012-05-29,SY,bc403bef3c2372cb4c76428d42e8d188,,DarkComet,,https://www.eff.org/deeplinks/2012/05/trojan-hidden-fake-revolutionary-documents-targets-syrian-activists 2012-06-06,SY,0d1bd081974a4dcdeee55f025423a72b,,BlackShades,,https://www.eff.org/deeplinks/2012/06/darkshades-rat-and-syrian-malware 2012-03-01,SY,e58a1795277edc08d35c6898f9befc1c,alosh66.no-ip.info,DarkComet,,https://www.eff.org/deeplinks/2012/03/fake-youtube-site-targets-syrian-activists-malware 2012-11-01,SY,ed86876db98db35d8c205f8c0b92b0a4,216.6.0.28,DarkComet,,https://www.eff.org/deeplinks/2012/12/iinternet-back-in-syria-so-is-malware 2012-11-01,SY,02c2ee77cf5aaf8ac03739640c46e822,216.6.0.28,DarkComet,,https://www.eff.org/deeplinks/2012/12/iinternet-back-in-syria-so-is-malware 2012-08-01,SY,af8e0815a0f44a78a95a89643f7c9ce6,216.6.0.28,DarkComet,,https://www.eff.org/deeplinks/2012/08/syrian-malware-post 2012-08-01,SY,499d9bb81a79359523c9e6ef05f1b0d0,216.6.0.28,DarkComet,,https://www.eff.org/deeplinks/2012/08/syrian-malware-post 2012-07-01,SY,c09d23a8e44c3170e9af0132788fceb0,alosh66.servecounterstrike.com,BlackShades,,https://www.eff.org/deeplinks/2012/07/new-blackshades-malware 2013-06-01,SY,b3e1c2e40be54fbc0f7921ea8ce807e2,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,8eda7dfa4ec4ac975bb12d2a3186bbeb,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,b083418be502162a4e248faab363f1b9,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,2ba789458781b1dfd7f34624c8410edb,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,59c6e0fa61d62a1f52b6092dc92a4aa7,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,61a26c391aa95084521f5c0f6f70b966,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2013-06-01,SY,00cc589571fa6e078cb92b34ea2ee1cc,,,,https://citizenlab.org/2013/06/a-call-to-harm/ 2014-10-01,SY,a8ef5ccebd2e3babdd243a2861673c26,aliahmahhmod.zapto.org,,,http://syrianmalware.com/ 2014-09-01,SY,7263e1d84b350c1465bb4c4c77b1bcec,k002.kiwi6.com,,,http://syrianmalware.com/ 2014-06-01,SY,28bf01f67db4a5e8e6174b066775eae0,31.9.48.141,njRAT,,https://citizenlab.org/2014/03/maliciously-repackaged-psiphon/ 2014-03-01,SY,a9e6f5d4c5996ff1a067d4c5f9ade821,31.9.48.7,DarkComet,,http://syrianmalware.com/ 2014-03-01,SY,4141842e30edaf429309ea6bc2374ef5,31.9.48.7,DarkComet,,http://syrianmalware.com/ 2013-07-01,SY,16a56e1288935b1696c701c1eed456ed,,,,http://syrianmalware.com/ 2013-01-01,SY,185c8d11c0611cae7c81f4458bf1adea,awrasx10.no-ip.biz,,,http://syrianmalware.com/ 2012-04-01,SY,7d867d6bd5fc3015a31fdfa121ba9187,,,activist,https://www.eff.org/deeplinks/2012/04/new-wave-facebook-phishing-attacks-targets-syrian-activists 2012-05-01,SY,79cdf420419a08f791752c759f8e0613,,DarkComet,activist,https://www.eff.org/deeplinks/2012/05/fake-skype-encryption-tool-targeted-syrian-activists-promises-security-delivers 2012-04-01,SY,8c9f9ccffbd2c888b9b5300412f8e580,,DarkComet,activist,https://www.eff.org/deeplinks/2012/04/campaign-targeting-syrian-activists-escalates-with-new-surveillance-malware 2012-01-01,SY,bb52415e659df7786b68d741a7a20162,meroo.no-ip.org,DarkComet,,http://syrianmalware.com/ 2012-01-01,SY,2838bf29fe88edfd70d1cee4b8551c74,meroo.no-ip.org,DarkComet,,http://syrianmalware.com/ 2012-01-01,SY,229af3e4f9dccc0497e7546c09790d50,meroo.no-ip.org,DarkComet,,http://syrianmalware.com/ 2012-04-01,SY,919374a229038ab2a8752790709ff7fc,alosh66.no-ip.info,,activist,http://syrianfreedom.org/some-quick-syrian-malware-analysis 2014-12-01,SY,f8bfb82aa92ea6a8e4e0b378781b3859,,Unknown,activist,https://citizenlab.org/2014/12/malware-attack-targeting-syrian-isis-critics/ 2013-12-20,VN,af170750a8228c9e5f21bfc35fc67721,yelp.webhop.org,,,https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal 2013-02-23,VN,6e667d6c9e527ada1a3284aa333d954d,static.jg7.org,,,https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal 2012-05-08,BH,ee5b03b5990dc310b77aac1d32da68de,,FinSpy,activist,https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/ 2012-05-08,BH,ad6f72b851ebcf7bf7c8b1c551140c5f,,FinSpy,activist,https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/ 2012-05-08,BH,e82647e42868e0ff0b6357fcf0f6e95f,,FinSpy,activist,https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/ 2012-05-08,BH,d1216d3fd238cd87d9a7e433b6892b98,,FinSpy,activist,https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/ 2012-01-01,ET,8ae2febe04102450fdbc26a38037c82b,213.55.99.74,FinSpy,opposition,https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/ 2013-12-01,ET,53a9e1b59ff37cc2aeff0391cc546201,46.4.69.25,RCS,journalist,https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ 2013-12-01,ET,8df850088e2324d5c89615be32bd8a35,46.4.69.25,RCS,journalist,https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ 2013-12-01,ET,015c238d56b8657c0946ec45b131362a,,RCS,journalist,https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ 2014-12-19,ET,91961aad912dc790943a1cb23b6e8297,46.251.239.xxx,RCS,journalist,https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ 2014-12-19,ET,f6a793a177447e3cab4108a707db65cd,46.251.239.xxx,RCS,journalist,https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ 2014-11-10,ET,4faeaed1065815e40bc7c4d9b943f439,46.251.239.xxx,RCS,journalist,https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ 2014-11-05,ET,3a7ef9a8c216bcdbbfecef934196d9c1,46.251.239.xxx,RCS,journalist,https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ 2014-11-01,ET,b7f54924450ae0675ce67c5edad1f243,46.251.239.xxx,RCS,journalist,https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/ 2012-07-13,MA,ba170664095b53d97690b5be208927e2,,RCS,journalist,https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ 2012-07-13,MA,ae8d4770ef02373d7680f160e01e8668,,RCS,journalist,https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ 2012-07-13,MA,6f055150861d8d6e145e9aca65f92822,,RCS,journalist,https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ 2012-07-23,AE,370620e853f1e42d806ad9bfd88d93c1,ar-24.com,RCS,activist,https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ 2012-07-23,AE,1738f7ac746a720f8589421840aa3aa6,ar-24.com,RCS,activist,https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ 2013-01-13,AE,e5dc7ecfc5578d51ba92ff710b05ae09,storge.myftp.org,SpyNet,activist,https://bahrainwatch.org/blog/2013/01/15/hacked-website-java-vulnerability-used-to-target-uae-activist-with-spyware/ 2015-04-08,IN,18bb1ce405e4abac4b0fc63054beac6c,dnsupdate.dynamic-dns.net,PlugX,tibetan,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-04-09,US,18bb1ce405e4abac4b0fc63054beac6c,dnsupdate.dynamic-dns.net,PlugX,tibetan,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-04-28,IN,d7832e76ee2c5c48ae428e57599b589e,free1999.jkub.com,Surtr,tibetan,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-04-28,IN,a990071b60046863c98bcf462fede77a,free1999.jkub.com,Surtr,tibetan,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-05-06,US,2a544922d3ece4351c1af4ca63c24550,good.wha.la,PlugX,tibetan,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-03-31,HK,705147c509206151c22515ef568bac51,dnsupdate.dynamic-dns.net,PlugX,ngo,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-03-06,HK,8a18a13910838d08e38db80a08e15bd5,eset-windows.findhere.org,Wofeksad,ngo,https://citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/ 2015-03-05,IN,8346b50c3954b5c25bf13fcd281eb11a,122.10.117.152,MsAttacker,tibetan,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2015-03-05,IN,6fc909a57650daff9a8b9264f38444a7,122.10.117.152,MsAttacker,tibetan,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2015-03-05,US,6fc909a57650daff9a8b9264f38444a7,122.10.117.152,MsAttacker,ngo,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2015-03-05,IN,2782c233ddde25040fb1febf9b13611e,122.10.117.152,MsAttacker,tibetan,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2015-03-05,IN,72707089512762fce576e29a0472eb16,semamail.info,ShadowNet,tibetan,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2015-03-05,IN,d8ae44cd65f97654f066edbcb501d999,semamail.info,ShadowNet,tibetan,https://citizenlab.org/2015/03/tibetan-uprising-day-malware-attacks/ 2012-05-01,US,58f6922dedb0d43c4478a4f38ad08620,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,IN,f2a0787388dd6373336b3f23f204524a,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,US,f2a0787388dd6373336b3f23f204524a,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,IN,0fe550a5d1187d38984c505ef7741638,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,US,0fe550a5d1187d38984c505ef7741638,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,US,971f99af0f9df674a79507ed7b3010fb,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,IN,971f99af0f9df674a79507ed7b3010fb,dtl.dnsd.me,LURK,tibetan,https://citizenlab.org/2012/07/recent-observations/ 2012-05-01,IN,8c06aec37c7e51f581aaa41f66d4ebad,internet.3-a.net,Surtr,tibetan,https://citizenlab.org/2013/08/surtr-malware-family-targeting-the-tibetan-community/ 2014-09-01,HK,15e5143e1c843b4836d7b6d5424fb4a5,61.36.11.72,Xsser,activist,https://malware.lu/articles/2014/09/29/analysis-of-code4hk.html 2014-09-01,HK,b9484ae3403c974db0f721b01bd6c302,61.36.11.72,Xsser,activist,https://malware.lu/articles/2014/09/29/analysis-of-code4hk.html 2014-09-01,HK,d332164aded163d52302f157aae00390,cjleichijun.3322.org,Gh0st,activist, 2014-01-01,YE,9372f0b8fca10de926fe5c6cbc38679d,88.150.227.197,IntelRS,activist, 2013-04-01,AO,d43dec59fa8e6629ff46ae9e56f698d8,securitytable.org docsforum.info,Kitmos,journalist,https://www.f-secure.com/weblog/archives/00002554.html 2014-02-20,IN,01d0b116289d21a7db8d926985a52494,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,cloud.social-neos.eu,Pony,ngo,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,eyon-neos.eu,Pony,ngo,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,patentanwalt-baden.de,Pony,ngo,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,quest.social-neos.eu,Pony,ngo,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,www.dimag-giantpale.it,Pony,ngo,https://targetedthreats.net 2013-01-31,US,04654a7d793d59d82ac672b430912b5c,www.indonesiascuba.com,Pony,ngo,https://targetedthreats.net 2013-09-17,IN,0842891d7847dace4d38e6102ba57b9b,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-17,US,0842891d7847dace4d38e6102ba57b9b,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-15,IN,08853629a8e5a86f0f398e8375898524,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-12-16,US,08853629a8e5a86f0f398e8375898524,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2011-08-02,IN,0ce9b2cf409806d87ad820a4f2595035,appleboy1111.blogspot.com,ShadowNet,tibetan,https://targetedthreats.net 2011-08-02,IN,0ce9b2cf409806d87ad820a4f2595035,www.duojee.info,ShadowNet,tibetan,https://targetedthreats.net 2013-10-24,IN,0e34bacb63f1d5be5efeb9c691a68b48,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-10-24,US,0e34bacb63f1d5be5efeb9c691a68b48,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-08,US,106ab8173c13f3351b470b3d4003e655,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-05-11,US,1088a1d71916c674daae730642d77eda,systen.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2013-11-01,IN,111aa752a737e159360a6cf123cccb6c,cocohk2.8042.my5m.com,ShadowNet,tibetan,https://targetedthreats.net 2013-09-01,US,14edd08e5856a32c9eda2ab45a1d85e0,dtl6.mooo.com,Surtr,tibetan,https://targetedthreats.net 2013-09-01,US,14edd08e5856a32c9eda2ab45a1d85e0,dtl.eatuo.com,Surtr,tibetan,https://targetedthreats.net 2013-06-26,IN,172a81190c1f817c702d652864aadf30,dtl6.mooo.com,Surtr,tibetan,https://targetedthreats.net 2013-08-01,IN,1862f91c4488fb32bc3c42bdb68c0c6c,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-08-01,US,1862f91c4488fb32bc3c42bdb68c0c6c,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-09-07,US,19da2c6dfde7f360d18133e954ac1f85,61.178.77.158,MacControl,tibetan,https://targetedthreats.net 2013-05-22,IN,20d91bb0ddce20ea6c17b55a6e854ea6,www.nedfortibt.info,ShadowNet,tibetan,https://targetedthreats.net 2013-05-21,US,20d91bb0ddce20ea6c17b55a6e854ea6,www.nedfortibt.info,ShadowNet,tibetan,https://targetedthreats.net 2012-04-20,US,239e08f416006080ec94ee4427f4be2e,adobe.homenet.org,nAspyUpdate,ngo,https://targetedthreats.net 2012-04-16,IN,239e08f416006080ec94ee4427f4be2e,adobe.homenet.org,nAspyUpdate,tibetan,https://targetedthreats.net 2013-09-30,IN,2f5e73bf7cbc6fcd05cb4a96cc2ff286,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-07-24,IN,2f66e1a97b17450445fbbec36de93daf,home.coffeeibus.com,Enfal,tibetan,https://targetedthreats.net 2013-03-15,US,310d6a1a2f03c0ee3483d84a09a132ba,vps.taghier.org,Pony,ngo,https://targetedthreats.net 2011-05-31,IN,31c2d5b639ead4302c2970875f59394e,tarmu.marod.ru,IMuler,tibetan,https://targetedthreats.net 2013-11-02,IN,32cd84c98f0e3b0ab38187e4ba8d6f45,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-01,US,32cd84c98f0e3b0ab38187e4ba8d6f45,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-16,IN,34c3e3071a08c7129b97d6cae9b8cad3,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-16,US,34c3e3071a08c7129b97d6cae9b8cad3,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-24,IN,3a6fe2d522bf5614ce1318d93d279c0b,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-13,IN,3ee53bdf0a7c479299d6575fd92a20dd,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-13,US,42eca61ce9cc5264c2172475f982bc22,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-05-03,US,45a9eadfc18ce31bca3c134f5aa1c467,johnsmith152.typepad.com,ShadowNet,tibetan,https://targetedthreats.net 2013-05-03,US,45a9eadfc18ce31bca3c134f5aa1c467,laraider.pla5.gongyinmy.com,ShadowNet,tibetan,https://targetedthreats.net 2013-08-31,IN,4975b7c29421470f9d459715c8eb29c4,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-08-31,US,4975b7c29421470f9d459715c8eb29c4,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-29,US,49d219f075405439b5db7b23e7616d8a,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-11-16,IN,4a75d51b38c9ddb5a2393e237eb8c73f,dtl.dnsd.me,CCTV0,tibetan,https://targetedthreats.net 2013-09-08,US,4f8075f867c73accbff2a323984b9481,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2011-04-07,IN,50ce67570dd231674068ec0f2352c208,luckstarttt.wordpress.com,WMIScriptKids,tibetan,https://targetedthreats.net 2011-03-30,IN,553349df46efa958cf5c0e0f727fa992,ourhappylife.sosblog.com,ShadowNet,tibetan,https://targetedthreats.net 2011-03-30,IN,553349df46efa958cf5c0e0f727fa992,sunnyday.cwahi.net,ShadowNet,tibetan,https://targetedthreats.net 2011-03-30,IN,553349df46efa958cf5c0e0f727fa992,www.cwahi.net,ShadowNet,tibetan,https://targetedthreats.net 2013-09-06,IN,579588657f5d09157107bc71334a9405,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-08,US,579588657f5d09157107bc71334a9405,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2015-01-05,US,5a43a27320490354c027618e18ad2d76,lenovo.wha.la,Surtr,tibetan,https://targetedthreats.net 2014-03-13,IN,5edc26162a84635b161e40799a83deee,godson355.vicp.cc,APT-3102,tibetan,https://targetedthreats.net 2013-08-21,IN,658c55d6f92b2e8ccccb82c6980ce2ab,113.10.173.179,Insta11,tibetan,https://targetedthreats.net 2013-08-21,US,658c55d6f92b2e8ccccb82c6980ce2ab,113.10.173.179,Insta11,tibetan,https://targetedthreats.net 2014-01-15,IN,66fd7611dd7426b03ff1deadf322bcce,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2014-01-15,US,66fd7611dd7426b03ff1deadf322bcce,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-04-15,IN,67d668aa22b3f47eacab399c1aeaeade,laraider2.he1.ifreeurl.com,ShadowNet,tibetan,https://targetedthreats.net 2013-12-17,IN,681956f6e7f8a8ded322933541ee6971,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-11-18,IN,6bd6b50af9361da2361ff34a8ca99274,183.86.194.130,APT-3102,tibetan,https://targetedthreats.net 2013-11-06,IN,6e5a45d2cbd4128cce975714201b30b5,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-06,US,6e5a45d2cbd4128cce975714201b30b5,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-10-17,IN,6f5074fc37a3a093951e9f979a940b46,www.tbtsociety.info,ShadowNet,tibetan,https://targetedthreats.net 2013-11-12,US,710697a1f998bd4e3b4e8de15364c414,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-07-24,US,7307fda023bfff9a26405477df532713,home.coffeeibus.com,Enfal,tibetan,https://targetedthreats.net 2011-11-17,IN,74b0f9e009c084d43d575ddbc4243775,tibet.my03.com,Enfal,tibetan,https://targetedthreats.net 2012-05-24,IN,7c1dd804795952b4cbca0c39bb48c21f,systen.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2012-05-23,US,7c1dd804795952b4cbca0c39bb48c21f,systen.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2013-10-28,IN,7f034dadccd2354c1dd91d6bb9965956,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-06-15,IN,81f3a6e7a73a9845c6eb9a3d46597223,114.142.147.51,PlugX,tibetan,https://targetedthreats.net 2012-06-15,US,81f3a6e7a73a9845c6eb9a3d46597223,114.142.147.51,PlugX,tibetan,https://targetedthreats.net 2013-06-13,IN,896c207da297979c46989c8145b594e8,dtl.eatuo.com,Surtr,tibetan,https://targetedthreats.net 2013-05-20,US,896c207da297979c46989c8145b594e8,dtl.eatuo.com,Surtr,tibetan,https://targetedthreats.net 2013-09-26,IN,8ba04d0b263e635e1a92fbe3a3f895ca,tibetantimes.ezua.com,Surtr,tibetan,https://targetedthreats.net 2014-01-15,US,8bc0414a7caa807d576547b1e03ce8a7,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2011-03-30,IN,8d4e42982060d884e2b7bd257727fd7c,60.167.78.229,iexpl0re,tibetan,https://targetedthreats.net 2013-09-04,IN,963cbcef30286016b92178886e656342,godson355.vicp.cc,LURK0,tibetan,https://targetedthreats.net 2013-12-03,IN,98147ad28ad60e1b960b8085cec3afbb,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-03,US,98147ad28ad60e1b960b8085cec3afbb,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2014-01-09,IN,9ba4670ed65229779ace6202b5fc8fe3,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2014-01-09,US,9ba4670ed65229779ace6202b5fc8fe3,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-11-10,IN,9bc9f0c8ab5b7c08795d8532d56d5949,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-11,US,9bc9f0c8ab5b7c08795d8532d56d5949,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-22,US,9cb8451845177dc56e9e4fbb8256f9a1,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2014-02-20,IN,9e6107bbfb5c3cfc15e1f19d56ed9bbe,lenovo.wha.la,Surtr,tibetan,https://targetedthreats.net 2013-09-01,US,9e8b59390788a56b25a5dad9e3490473,dtl6.mooo.com,Surtr,tibetan,https://targetedthreats.net 2012-10-17,US,a01ed70622dd34c00577980b0ba297b5,61.178.77.98,CCTV0,tibetan,https://targetedthreats.net 2013-11-04,IN,a39cd3a80567e2865541b2307a7cbeda,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2011-12-24,IN,a71512c5582da6d8f67173215b6105db,204.134.116.229,iexpl0re,tibetan,https://targetedthreats.net 2012-05-26,IN,a917519225a6a0696f77f00a3d0db8e1,web.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2012-05-25,US,a917519225a6a0696f77f00a3d0db8e1,web.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2013-08-30,IN,aa34ef3c1033fdd1e0e680313bb5b8a4,dtl6.mooo.com,Surtr,tibetan,https://targetedthreats.net 2013-08-29,US,aa34ef3c1033fdd1e0e680313bb5b8a4,dtl6.mooo.com,Surtr,tibetan,https://targetedthreats.net 2013-08-21,IN,ab3b22a1789bc669a92d81b3f9ff2732,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-10-31,IN,b005dda0239ec6e47652682b7a88f7f7,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-10-31,US,b005dda0239ec6e47652682b7a88f7f7,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-06-18,US,b203d7615afacb2fd696f4a816fdb59d,61.178.77.98,Gh0st,tibetan,https://targetedthreats.net 2013-08-27,IN,b5ec46322334d5712acd386622ee0f04,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2011-03-30,IN,b7d2f26f9a47328ae52cf080f4dce289,blog.sina.com.cn,WMIScriptKids,tibetan,https://targetedthreats.net 2011-03-30,IN,b7d2f26f9a47328ae52cf080f4dce289,hk.myblog.yahoo.com,WMIScriptKids,tibetan,https://targetedthreats.net 2013-10-30,IN,be456ca0911cc9a3dfd060e96e72984e,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-10-30,US,be456ca0911cc9a3dfd060e96e72984e,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-10-26,US,be522b7f11b6fa855f4cbe75e11b299b,222.174.215.162,Quarian,tibetan,https://targetedthreats.net 2013-10-02,US,befd5c2d98b02b7ae261699ee2d0804b,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2012-06-01,US,c1fc7ce179241146ceb2628a567902e9,systen.windowsdeupdate.com,PlugX,tibetan,https://targetedthreats.net 2013-11-15,IN,c55d3622965c519c644276591baa166d,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-15,US,c55d3622965c519c644276591baa166d,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-19,IN,c7644c3be87c042d18f28b46ee63f82d,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-12-19,US,c7644c3be87c042d18f28b46ee63f82d,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2013-10-11,IN,d64386d4db1ed50a282743b765f1cfca,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-10-11,US,d64386d4db1ed50a282743b765f1cfca,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-09-27,IN,dd11efc8b742b7760279f64d9aa4b5d7,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2014-01-16,US,df545971bd9cdf668d4768d749750b78,tibelds.ddns.us,Surtr,tibetan,https://targetedthreats.net 2014-01-16,US,df545971bd9cdf668d4768d749750b78,vm459.sakuraserver.co,Surtr,tibetan,https://targetedthreats.net 2013-08-28,IN,e130ace39a97c7e6d67a9324d09c5071,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-08-28,US,e130ace39a97c7e6d67a9324d09c5071,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-02,IN,e28115bd2378c205c90432e2ae28622e,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-02,US,e28115bd2378c205c90432e2ae28622e,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2011-08-11,IN,e880292bed67d1fc96e630bc42978d76,antivirus-groups.com,PoisonIvy,tibetan,https://targetedthreats.net 2011-08-11,IN,e880292bed67d1fc96e630bc42978d76,antivirus-groupsdd.com,PoisonIvy,tibetan,https://targetedthreats.net 2013-04-11,US,eb5ae935505a9b8e9bbedd4a10b94c2c,spit113.minidns.net,NetTraveler,tibetan,https://targetedthreats.net 2012-07-26,IN,f208137dfb3271b5cd3c67492e2522dc,dplcoopsociety.us.dwyu.com,DuoJeen,tibetan,https://targetedthreats.net 2012-07-25,US,f208137dfb3271b5cd3c67492e2522dc,dplcoopsociety.us.dwyu.com,DuoJeen,tibetan,https://targetedthreats.net 2013-11-10,IN,f416a5e4cc3dadc4f53f6a64e14de1bf,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-11,US,f416a5e4cc3dadc4f53f6a64e14de1bf,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-11-07,IN,fdd2f564ce4aa338753d49992e6959ac,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-05-03,IN,fe02779e3dc63584676f288148353722,laraider2.he1.ifreeurl.com,ShadowNet,tibetan,https://targetedthreats.net 2013-05-03,IN,fe02779e3dc63584676f288148353722,pomehra.typepad.com,ShadowNet,tibetan,https://targetedthreats.net 2012-05-10,US,fe374c495e07ec288e4e4bf8f79b4940,www.xiuxiu.in,DuoJeen,tibetan,https://targetedthreats.net 2013-12-16,IN,ffaf1b53d4fcf6dc920d1b3c928f6715,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2013-12-17,US,ffaf1b53d4fcf6dc920d1b3c928f6715,free1999.jkub.com,Surtr,tibetan,https://targetedthreats.net 2014-12-01,AR,8fb96dfab7e4c0acb1eb9f4e950ba4b9,deyrep24.ddns.net,AlienSpy,lawyer,https://theintercept.com/2015/08/21/inside-the-spyware-campaign-against-argentine-troublemakers-including-alberto-nisman/ 2015-06-05,MM,53f81415ccedf453d6e3ebcdc142b966,t1.mailsecurityservice.com t2.mailsecurityservice.comcom,PlugX,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-06-05,MM,c4c147bdfddffec2eea6bf99661e69ee,t1.mailsecurityservice.com t2.mailsecurityservice.comcom,PlugX,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-06-05,MM,884d46c01c762ad6ddd2759fd921bf71,t1.mailsecurityservice.com t2.mailsecurityservice.comcom,PlugX,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-06-05,MM,56f0e67d981024ddcc215543698f44fb,t1.mailsecurityservice.com t2.mailsecurityservice.comcom,PlugX,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-06-05,MM,7e0081fba718fcd71753d3199a290f03,t1.mailsecurityservice.com t2.mailsecurityservice.comcom,PlugX,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-08-16,MM,6701662097e274f3cd089ceec35471d2,198.44.190.85,3102,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-08-16,MM,699b3d90b050cae37f65c855ec7f616a,198.44.190.85,3102,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-08-16,MM,5710d567d98a8f4a6682859ce3a35336,198.44.190.85,3102,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-08-16,MM,cec071424d417a095221bf8992819388,198.44.190.85,3102,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-08-16,MM,49ceba3347d39870f15f2ab0391af234,198.44.190.85,3102,ngo,https://citizenlab.org/2015/10/targeted-attacks-ngo-burma/ 2015-04-15,EC,ea7bcf58a4ccdecb0c64e56b9998a4ac,daynews.sytes.net,Adzok,opposition,https://citizenlab.org/2015/12/packrat-report/ 2015-09-03,EC,efc0009d76a2057f86c5f00030378c72,daynews.sytes.net,Adwind,activist,https://citizenlab.org/2015/12/packrat-report/ 2015-09-01,EC,74613eae84347183b4ca61b912a4573f,daynews.sytes.net,AlienSpy,activist,https://citizenlab.org/2015/12/packrat-report/ 2016-03-18,CN,3fe0cbedec6969803a72b8c76a4a0a03,sent.leeh0m.org found.leeh0m.org,PoisonIvy,activist,http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/ 2016-03-17,CN,e1b4a5a565fdfcec52346d3b6063c587,sent.leeh0m.org found.leeh0m.org,PoisonIvy,activist,http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/ 2016-03-21,CN,50064d33625970a8145add7e3e242fe3,sent.leeh0m.org found.leeh0m.org,PoisonIvy,activist,http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/ 2014-09-01,CN,1befa2c2d1bfc8e87d52871c868f75fe,58.64.178.77,Beginto,activist,http://www.volexity.com/blog/?p=33 2014-09-01,CN,a482a84d13c76b950ce5bc7e75f4edef,58.64.178.77,Beginto,activist,http://www.volexity.com/blog/?p=33 2016-01-07,CN,d8becbd6f188e3fb2c4d23a2d36d137b,59.188.12.123,UP007,activist,https://citizenlab.org/2016/04/between-hong-kong-and-burma/ 2016-01-08,CN,d579d7a42ff140952da57264614c37bc,59.188.12.123,UP007,activist,https://citizenlab.org/2016/04/between-hong-kong-and-burma/ 2015-11-01,GB,80e8ef78b9e28015cde4205aaa65da97,adhostingcache.com,Stealth Falcon,journalist,https://citizenlab.org/2016/05/stealth-falcon/