# Copyright (c) 2014-2023 Maltrail developers (https://github.com/stamparm/maltrail/) # See the file 'LICENSE' for copying permission # Aliases: blackbytent ransomware # Reference: https://github.com/thetanz/ransomwatch/blob/main/docs/INDEX.md 6iaj3efye3q62xjgfxyegrufhewxew7yt4scxjd45tlfafyja6q4ctqd.onion f5uzduboq4fa2xkjloprmctk7ve3dm46ff7aniis66cbekakvksxgeqd.onion # Reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/ # Reference: https://otx.alienvault.com/pulse/616d438afb150f61aaa17eca http://45.9.148.114 # Reference: https://www.zscaler.com/blogs/security-research/analysis-blackbyte-ransomwares-go-based-variants # Reference: https://otx.alienvault.com/pulse/62729a7f856828d9110d4d47 7oukjxwkbnwyg7cekudzp66okrchbuubde2j3h6fkpis6izywoj2eqad.onion # Reference: https://research.nccgroup.com/2022/07/13/climbing-mount-everest-black-byte-bytes-back/ # Reference: https://otx.alienvault.com/pulse/62d00411f49bfb5dd2362e88 18.193.71.144:10443 3.22.79.23:10443 3.22.79.23:8080 45.84.0.164:10443 # Reference: https://twitter.com/cyb3rops/status/1639030126577942529 # Reference: https://twitter.com/splinter_code/status/1642970055519399936 # Reference: https://tria.ge/230321-wnvzsscd27/behavioral2 a2dbso6dijaqsmut36r6y4nps4cwivmfog5bpzf6uojovce6f3gl36id.onion jbeg2dct2zhku6c2vwnpxtm2psnjo2xnqvvpoiiwr5hxnc6wrp3uhnad.onion tre7npfj65g4pxvjr2qyqwqkpo4heemj7ysgr6mtlf3rihgfradyjvad.onion