diff --git a/clusters/malpedia.json b/clusters/malpedia.json index c36ad9f..62b2b4e 100644 --- a/clusters/malpedia.json +++ b/clusters/malpedia.json @@ -3935,25 +3935,6 @@ "uuid": "6cb47609-b03e-43d9-a4c7-8342f1011f3b", "value": "ANGRYREBEL" }, - { - "description": "", - "meta": { - "refs": [ - "https://malpedia.caad.fkie.fraunhofer.de/details/elf.avoslocker", - "https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux", - "https://blog.lexfo.fr/Avoslocker.html", - "https://www.ic3.gov/Media/News/2022/220318.pdf", - "https://blogs.vmware.com/security/2022/02/avoslocker-modern-linux-ransomware-threats.html", - "https://blog.cyble.com/2022/01/17/avoslocker-ransomware-linux-version-targets-vmware-esxi-servers/", - "https://blogs.blackberry.com/en/2022/04/threat-thursday-avoslocker-prompts-advisory-from-fbi-and-fincen", - "https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html" - ], - "synonyms": [], - "type": [] - }, - "uuid": "465b6a74-87ca-4459-b4be-3f8b272f4485", - "value": "Avoslocker" - }, { "description": "AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration.", "meta": {