As malware needs to communicate in some ways with its operators (for getting commands, updates and sending stolen data) they typically implement a form of communication to command & control servers. Those C&Cs are either hard-coded or generated (based on some type of seed) domain names or IPs. For generated domains they implement a domain [...]