mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
Add DenesRAT/METALJACK
This commit is contained in:
parent
07145a4759
commit
46a6d9fcb1
1 changed files with 19 additions and 1 deletions
|
@ -7998,7 +7998,25 @@
|
||||||
},
|
},
|
||||||
"uuid": "32a6065c-4f4e-4a60-8717-5872b5f21ac4",
|
"uuid": "32a6065c-4f4e-4a60-8717-5872b5f21ac4",
|
||||||
"value": "Gelup malware tool"
|
"value": "Gelup malware tool"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "DenesRAT is a private Trojan horse of the \"Sea Lotus\" organization, which can perform corresponding functions according to the instructions issued by the C2 server. The main functions are file operations, such as creating files or directories, deleting files or directories, finding files; registry reading and writing; remote code execution, such as creating processes, executing DLLs, etc....",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"http://baijiahao.baidu.com/s?id=1661498030941117519",
|
||||||
|
"https://www.fireeye.com/blog/threat-research/2020/04/apt32-targeting-chinese-government-in-covid-19-related-espionage.html"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"METALJACK"
|
||||||
|
],
|
||||||
|
"type": [
|
||||||
|
"Loader",
|
||||||
|
"Backdoor"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "edd9e14c-80f7-4a50-ab85-fa1120c54003",
|
||||||
|
"value": "DenesRAT"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 133
|
"version": 134
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue