# Copyright (c) 2014-2024 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://twitter.com/makflwana/status/1305130765219295234
# Reference: https://app.any.run/tasks/4a697768-6cb3-4df2-81a2-b38ea5dfc911/
# Reference: https://github.com/thetanz/ransomwatch/blob/main/docs/INDEX.md

kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion
qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion

# Reference: https://twitter.com/r3dbU7z/status/1496175099086610438

http://85.217.170.156

# Reference: https://www.cisa.gov/uscert/ncas/alerts/aa22-181a
# Reference: https://otx.alienvault.com/pulse/62be9ffa5e5d44f2d9d4e816

gvlay6u4g53rxdi5.onion
gvlay6y4g53rxdi5.onion
medusacegu2ufmc3kx2kkqicrlcxdettsjcenhjena6uannk5f4ffuyd.onion

# Reference: https://twitter.com/1ZRR4H/status/1580363613784526848
# Reference: https://www.virustotal.com/gui/domain/decorous.cyou/detection

decorous.cyou

# Reference: https://twitter.com/D4RKR4BB1T47/status/1629209284037734400

188.241.39.161:8088

# Reference: https://unit42.paloaltonetworks.com/medusa-ransomware-escalation-new-leak-site/
# Reference: https://otx.alienvault.com/pulse/65a07afb559173d01a6eb537

medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion

# Reference: https://twitter.com/AlvieriD/status/1765919058539561177

xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion

# Reference: https://x.com/RakeshKrish12/status/1798614581419594234

45.9.148.39:8001
kyfiw76eol6ph2mq7pi5e5tdvce37bicddhai62qhdc5ja6jdchz4qqd.onion
s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion
