mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-25 16:27:19 +00:00
chg: [malpedia] more duplicates removed
This commit is contained in:
parent
5b07433824
commit
2c0f5d2461
1 changed files with 0 additions and 19 deletions
|
@ -3935,25 +3935,6 @@
|
||||||
"uuid": "6cb47609-b03e-43d9-a4c7-8342f1011f3b",
|
"uuid": "6cb47609-b03e-43d9-a4c7-8342f1011f3b",
|
||||||
"value": "ANGRYREBEL"
|
"value": "ANGRYREBEL"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"description": "",
|
|
||||||
"meta": {
|
|
||||||
"refs": [
|
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.avoslocker",
|
|
||||||
"https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux",
|
|
||||||
"https://blog.lexfo.fr/Avoslocker.html",
|
|
||||||
"https://www.ic3.gov/Media/News/2022/220318.pdf",
|
|
||||||
"https://blogs.vmware.com/security/2022/02/avoslocker-modern-linux-ransomware-threats.html",
|
|
||||||
"https://blog.cyble.com/2022/01/17/avoslocker-ransomware-linux-version-targets-vmware-esxi-servers/",
|
|
||||||
"https://blogs.blackberry.com/en/2022/04/threat-thursday-avoslocker-prompts-advisory-from-fbi-and-fincen",
|
|
||||||
"https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html"
|
|
||||||
],
|
|
||||||
"synonyms": [],
|
|
||||||
"type": []
|
|
||||||
},
|
|
||||||
"uuid": "465b6a74-87ca-4459-b4be-3f8b272f4485",
|
|
||||||
"value": "Avoslocker"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"description": "AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration.",
|
"description": "AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
|
Loading…
Reference in a new issue