diff --git a/clusters/malpedia.json b/clusters/malpedia.json index a7174e4..c36ad9f 100644 --- a/clusters/malpedia.json +++ b/clusters/malpedia.json @@ -8517,20 +8517,6 @@ "uuid": "c7b1cc91-7464-436e-ac40-3b06c98400a5", "value": "xdr33" }, - { - "description": "", - "meta": { - "refs": [ - "https://malpedia.caad.fkie.fraunhofer.de/details/elf.xmrig", - "https://www.aquasec.com/blog/container-security-tnt-container-attack/", - "https://www.aquasec.com/blog/pg_mem-a-malware-hidden-in-the-postgres-processes/" - ], - "synonyms": [], - "type": [] - }, - "uuid": "4e67dedd-ee72-4fe4-aaba-c4dea26ea9ef", - "value": "XMRIG" - }, { "description": "Linux DDoS C&C Malware", "meta": { @@ -10297,19 +10283,6 @@ "uuid": "5d7b9bcf-a0b6-47eb-8350-a80fac356567", "value": "BANSHEE" }, - { - "description": "", - "meta": { - "refs": [ - "https://malpedia.caad.fkie.fraunhofer.de/details/osx.beavertail", - "https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/" - ], - "synonyms": [], - "type": [] - }, - "uuid": "61ec34d7-6c40-4900-9a79-f16b2eec213e", - "value": "beavertail" - }, { "description": "", "meta": { @@ -17697,19 +17670,6 @@ "uuid": "d2fd10ba-5904-4679-8758-509b72b1aa2c", "value": "BEATDROP" }, - { - "description": "", - "meta": { - "refs": [ - "https://malpedia.caad.fkie.fraunhofer.de/details/win.beavertail", - "https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/" - ], - "synonyms": [], - "type": [] - }, - "uuid": "c0033411-7d53-47bd-ab0f-d98263b980f4", - "value": "Beavertail" - }, { "description": "Bedep has been mostly observed in ad-fraud campaigns, although it can also generally load modules for different tasks. It was dropped by the Angler Exploit Kit.", "meta": { @@ -60668,5 +60628,5 @@ "value": "Zyklon" } ], - "version": 21774 + "version": 21776 }