From 5c6f3a036bf1e3decb541bca0f6df5b66fa04b80 Mon Sep 17 00:00:00 2001 From: Rony Date: Wed, 24 Feb 2021 21:55:04 +0530 Subject: [PATCH] removing DePrimon DePrimon is not a TA, added malfamily (waiting for approval) to Malpedia to better reflect that. --- clusters/threat-actor.json | 15 --------------- 1 file changed, 15 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 2fd7c74..74ca0d2 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7996,21 +7996,6 @@ "uuid": "947a450a-df6c-4c2e-807b-0da8ecea1d26", "value": "Attor" }, - { - "description": "DePriMon is an unusually advanced downloader whose developers have put extra effort into setting up the architecture and crafting the critical components.", - "meta": { - "cfr-target-category": [ - "Private sector", - "Finance" - ], - "cfr-type-of-incident": "Espionage", - "refs": [ - "https://www.welivesecurity.com/2019/11/21/deprimon-default-print-monitor-malicious-downloader" - ] - }, - "uuid": "443faf38-ad93-4421-8a53-47ad84b195fa", - "value": "DePriMon" - }, { "description": "According to 360 TIC the actor has carried out continuous cyber espionage activities since 2011 on key units and departments of the Chinese government, military industry, scientific research, and finance. The organization focuses on information related to the nuclear industry and scientific research. The targets were mainly concentrated in mainland China...[M]ore than 670 malware samples have been collected from the group, including more than 60 malicious plugins specifically for lateral movement; more than 40 C2 domain names and IPs related to the organization have also been discovered.", "meta": {