-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gootloader malware command and control servers #56
Labels
Comments
IP can not by used in HOSTS or domains list: StevenBlack/hosts#1006 StevenBlack/hosts#1004 |
This was referenced Mar 18, 2023
I have updated the request to remove pure ip addresses. |
krystian3w
changed the title
Add Gootloader malware command and control servers.
Gootloader malware command and control servers
Mar 18, 2023
Thank you for adding these and thank you for maintaining the list! |
This comment was marked as resolved.
This comment was marked as resolved.
This thread was automatically locked as/because there was no activity after it was closed. Please open a new ticket for related issues. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Goot loader infects machines and is the first step in a ransomware attack.
A full writeup on goot loader listing the servers can be found here.
https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations
The text was updated successfully, but these errors were encountered: