mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
fix: [malpedia] remove duplicate urls
This commit is contained in:
parent
87f9b0d029
commit
69f878c86f
1 changed files with 1 additions and 7 deletions
|
@ -4733,7 +4733,6 @@
|
||||||
"https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/",
|
"https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/",
|
||||||
"https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment",
|
"https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment",
|
||||||
"https://www.cadosecurity.com/2020/08/17/teamtnt-the-first-crypto-mining-worm-to-steal-aws-credentials/",
|
"https://www.cadosecurity.com/2020/08/17/teamtnt-the-first-crypto-mining-worm-to-steal-aws-credentials/",
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.teamtnt",
|
|
||||||
"https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera",
|
"https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera",
|
||||||
"https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf",
|
"https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf",
|
||||||
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/",
|
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/",
|
||||||
|
@ -8372,7 +8371,6 @@
|
||||||
"description": "",
|
"description": "",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001",
|
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001"
|
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001"
|
||||||
],
|
],
|
||||||
"synonyms": [],
|
"synonyms": [],
|
||||||
|
@ -8385,7 +8383,6 @@
|
||||||
"description": "",
|
"description": "",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002",
|
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002"
|
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002"
|
||||||
],
|
],
|
||||||
"synonyms": [],
|
"synonyms": [],
|
||||||
|
@ -8398,7 +8395,6 @@
|
||||||
"description": "",
|
"description": "",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003",
|
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003"
|
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003"
|
||||||
],
|
],
|
||||||
"synonyms": [],
|
"synonyms": [],
|
||||||
|
@ -15194,8 +15190,7 @@
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader",
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader",
|
||||||
"https://blog.vincss.net/2020/09/re016-malware-analysis-modiloader-eng.html",
|
"https://blog.vincss.net/2020/09/re016-malware-analysis-modiloader-eng.html",
|
||||||
"https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands",
|
"https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands",
|
||||||
"https://zero2auto.com/2020/08/20/dbatloader-modiloader-first-stage/",
|
"https://zero2auto.com/2020/08/20/dbatloader-modiloader-first-stage/"
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader"
|
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"ModiLoader",
|
"ModiLoader",
|
||||||
|
@ -32135,7 +32130,6 @@
|
||||||
"https://www.secrss.com/articles/26507",
|
"https://www.secrss.com/articles/26507",
|
||||||
"https://s.tencent.com/research/report/659.html",
|
"https://s.tencent.com/research/report/659.html",
|
||||||
"https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/",
|
"https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/",
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.sidewinder",
|
|
||||||
"https://medium.com/@Sebdraven/apt-sidewinder-tricks-powershell-anti-forensics-and-execution-side-loading-5bc1a7e7c84c",
|
"https://medium.com/@Sebdraven/apt-sidewinder-tricks-powershell-anti-forensics-and-execution-side-loading-5bc1a7e7c84c",
|
||||||
"https://s.tencent.com/research/report/479.html"
|
"https://s.tencent.com/research/report/479.html"
|
||||||
],
|
],
|
||||||
|
|
Loading…
Reference in a new issue