mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-25 16:27:19 +00:00
fix: [malpedia] duplicates removed
This commit is contained in:
parent
e53b061382
commit
030d313f53
1 changed files with 1 additions and 41 deletions
|
@ -8517,20 +8517,6 @@
|
|||
"uuid": "c7b1cc91-7464-436e-ac40-3b06c98400a5",
|
||||
"value": "xdr33"
|
||||
},
|
||||
{
|
||||
"description": "",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.xmrig",
|
||||
"https://www.aquasec.com/blog/container-security-tnt-container-attack/",
|
||||
"https://www.aquasec.com/blog/pg_mem-a-malware-hidden-in-the-postgres-processes/"
|
||||
],
|
||||
"synonyms": [],
|
||||
"type": []
|
||||
},
|
||||
"uuid": "4e67dedd-ee72-4fe4-aaba-c4dea26ea9ef",
|
||||
"value": "XMRIG"
|
||||
},
|
||||
{
|
||||
"description": "Linux DDoS C&C Malware",
|
||||
"meta": {
|
||||
|
@ -10297,19 +10283,6 @@
|
|||
"uuid": "5d7b9bcf-a0b6-47eb-8350-a80fac356567",
|
||||
"value": "BANSHEE"
|
||||
},
|
||||
{
|
||||
"description": "",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.beavertail",
|
||||
"https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/"
|
||||
],
|
||||
"synonyms": [],
|
||||
"type": []
|
||||
},
|
||||
"uuid": "61ec34d7-6c40-4900-9a79-f16b2eec213e",
|
||||
"value": "beavertail"
|
||||
},
|
||||
{
|
||||
"description": "",
|
||||
"meta": {
|
||||
|
@ -17697,19 +17670,6 @@
|
|||
"uuid": "d2fd10ba-5904-4679-8758-509b72b1aa2c",
|
||||
"value": "BEATDROP"
|
||||
},
|
||||
{
|
||||
"description": "",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.beavertail",
|
||||
"https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/"
|
||||
],
|
||||
"synonyms": [],
|
||||
"type": []
|
||||
},
|
||||
"uuid": "c0033411-7d53-47bd-ab0f-d98263b980f4",
|
||||
"value": "Beavertail"
|
||||
},
|
||||
{
|
||||
"description": "Bedep has been mostly observed in ad-fraud campaigns, although it can also generally load modules for different tasks. It was dropped by the Angler Exploit Kit.",
|
||||
"meta": {
|
||||
|
@ -60668,5 +60628,5 @@
|
|||
"value": "Zyklon"
|
||||
}
|
||||
],
|
||||
"version": 21774
|
||||
"version": 21776
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue