pimp winnti

This commit is contained in:
Thanat0s 2017-02-26 19:26:21 +01:00
parent 8de827977c
commit 0775bfce62

View file

@ -356,7 +356,7 @@
}, },
{ {
"value": "NetTraveler", "value": "NetTraveler",
"description": "APT that infected hundreds of high profile victims in more than 40 countries. Known targets of NetTraveler include Tibetan/Uyghur activists, oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies and military contractors.", "description": "APT that infected hundreds of high profile victims in more than 40 countries. Known targets of NetTraveler include Tibetan/Uyghur activists, oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies and military contractors.",
"meta": { "meta": {
"synonyms": [ "synonyms": [
"TravNet", "TravNet",
@ -371,7 +371,21 @@
} }
}, },
{ {
"value": "Winnti" "value": "Winnti",
"description": "APT used As part of Operation SMN, Novetta analyzed recent versions of the Winnti malware. The samples, compiled from mid- to late 2014, exhibited minimal functional changes over the previous generations Kaspersky reported in 2013.",
"meta": {
"synonyms": [
"Etso",
"SUQ",
"Agent.ALQHI"
],
"refs": [
"https://securelist.com/blog/incidents/57455/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/"
],
"type": [
"Backdoor"
]
}
}, },
{ {
"value": "Mimikatz", "value": "Mimikatz",