mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-25 16:27:19 +00:00
Ran once again jq_all_the_things.sh to format JSON files
This commit is contained in:
parent
ca67778eb0
commit
5313f22343
2 changed files with 3 additions and 3 deletions
|
@ -1220,4 +1220,4 @@
|
|||
}
|
||||
],
|
||||
"version": 6
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1525,7 +1525,7 @@
|
|||
{
|
||||
"description": "Bolek is a malware from the Kbot/Carberp family. It is being subject to frequent updates and has malicious capabilities which include self-spreading through USB and network shares, TOR network access, screen captures and web injects, and uses asymmetric cryptography to secure network communications.",
|
||||
"meta": {
|
||||
"date": "May 2016",
|
||||
"date": "May 2016",
|
||||
"refs": [
|
||||
"https://www.bitsight.com/blog/bolek-an-evolving-botnet-targets-poland-and-ukraine"
|
||||
]
|
||||
|
@ -1617,7 +1617,7 @@
|
|||
"uuid": "4ccad4ee-3bff-41ac-8d05-0d5acbaaefbe",
|
||||
"value": "Crackonosh"
|
||||
},
|
||||
{
|
||||
{
|
||||
"description": "FluBot is a remote control and info stealer malware. It has abilities to read and send SMS message, delete app, and execute arbitrary commands. It is often distributed through SMS messages. PRODAFT describes FluBot as a banking malware which originally targeted Spain. Since the first quarter of 2021 it has been targeting many other European countries as well as Japan. It uses a DGA for it's C&C and relies on both DNS and DNS-over-HTTPS for name resolution. Despite arrests of multiple people suspected of involvement with this malware in March of 2021, the campaign has only intensified since.",
|
||||
"meta": {
|
||||
"date": "2021",
|
||||
|
|
Loading…
Reference in a new issue