The dynamic analysis stage identified 274 samples
with network connections detected as DirtJumper C&C
traffic from the traffic captures created by running the
malware in our analysis system. A total of 68 unique
C&C URLs were identified to be queried for commands
according to the bot’s communication scheme.