mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
add several tools
This commit is contained in:
parent
011e0e9574
commit
3ae0e5f113
3 changed files with 31 additions and 2 deletions
|
@ -4265,9 +4265,29 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "1dcd622c-2d1a-11e8-870e-9f50a5dd5a84"
|
"uuid": "1dcd622c-2d1a-11e8-870e-9f50a5dd5a84"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "RedDrop",
|
||||||
|
"description": "RedDrop can perform a vast array of malicious actions, including recording nearby audio and uploading the data to cloud-storage accounts on Dropbox and Google Drive.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.bleepingcomputer.com/news/security/new-reddrop-android-spyware-records-nearby-audio/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "3178ca72-2ded-11e8-846e-eb40889b4f9f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Igexin",
|
||||||
|
"description": "Igexin has the capability of spying on victims through otherwise benign apps by downloading malicious plugins",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://blog.lookout.com/igexin-malicious-sdk"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "5400bf04-2e6b-11e8-88c3-f7aa904d55b8"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 5,
|
"version": 6,
|
||||||
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
|
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
|
||||||
"description": "Android malware galaxy based on multiple open sources.",
|
"description": "Android malware galaxy based on multiple open sources.",
|
||||||
"authors": [
|
"authors": [
|
||||||
|
|
|
@ -9354,6 +9354,14 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "cbe3ee70-2d11-11e8-84bb-9b3c525a48d9"
|
"uuid": "cbe3ee70-2d11-11e8-84bb-9b3c525a48d9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Flotera Ransomware",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.bleepingcomputer.com/news/security/author-of-polski-vortex-and-flotera-ransomware-families-arrested-in-poland/"
|
||||||
|
]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"source": "Various",
|
"source": "Various",
|
||||||
|
|
|
@ -3118,7 +3118,8 @@
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://blog.malwarebytes.com/threat-analysis/2016/10/trick-bot-dyrezas-successor/",
|
"https://blog.malwarebytes.com/threat-analysis/2016/10/trick-bot-dyrezas-successor/",
|
||||||
"https://blog.fraudwatchinternational.com/malware/trickbot-malware-works",
|
"https://blog.fraudwatchinternational.com/malware/trickbot-malware-works",
|
||||||
"https://securityintelligence.com/trickbot-is-hand-picking-private-banks-for-targets-with-redirection-attacks-in-tow/"
|
"https://securityintelligence.com/trickbot-is-hand-picking-private-banks-for-targets-with-redirection-attacks-in-tow/",
|
||||||
|
"https://www.bleepingcomputer.com/news/security/trickbot-banking-trojan-gets-screenlocker-component/"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"TrickBot",
|
"TrickBot",
|
||||||
|
|
Loading…
Reference in a new issue