fix: [malpedia] remove duplicate urls

This commit is contained in:
Alexandre Dulaunoy 2021-10-20 12:16:22 +02:00
parent 87f9b0d029
commit 69f878c86f
Signed by: adulau
GPG key ID: 09E2CD4944E6CBCD

View file

@ -4733,7 +4733,6 @@
"https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/", "https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/",
"https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment", "https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment",
"https://www.cadosecurity.com/2020/08/17/teamtnt-the-first-crypto-mining-worm-to-steal-aws-credentials/", "https://www.cadosecurity.com/2020/08/17/teamtnt-the-first-crypto-mining-worm-to-steal-aws-credentials/",
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.teamtnt",
"https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera", "https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera",
"https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf", "https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf",
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/", "https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/",
@ -8372,7 +8371,6 @@
"description": "", "description": "",
"meta": { "meta": {
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001",
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001" "https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_001"
], ],
"synonyms": [], "synonyms": [],
@ -8385,7 +8383,6 @@
"description": "", "description": "",
"meta": { "meta": {
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002",
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002" "https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_002"
], ],
"synonyms": [], "synonyms": [],
@ -8398,7 +8395,6 @@
"description": "", "description": "",
"meta": { "meta": {
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003",
"https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003" "https://malpedia.caad.fkie.fraunhofer.de/details/py.unidentified_003"
], ],
"synonyms": [], "synonyms": [],
@ -15194,8 +15190,7 @@
"https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader", "https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader",
"https://blog.vincss.net/2020/09/re016-malware-analysis-modiloader-eng.html", "https://blog.vincss.net/2020/09/re016-malware-analysis-modiloader-eng.html",
"https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands", "https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands",
"https://zero2auto.com/2020/08/20/dbatloader-modiloader-first-stage/", "https://zero2auto.com/2020/08/20/dbatloader-modiloader-first-stage/"
"https://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader"
], ],
"synonyms": [ "synonyms": [
"ModiLoader", "ModiLoader",
@ -32135,7 +32130,6 @@
"https://www.secrss.com/articles/26507", "https://www.secrss.com/articles/26507",
"https://s.tencent.com/research/report/659.html", "https://s.tencent.com/research/report/659.html",
"https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/", "https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/",
"https://malpedia.caad.fkie.fraunhofer.de/details/win.sidewinder",
"https://medium.com/@Sebdraven/apt-sidewinder-tricks-powershell-anti-forensics-and-execution-side-loading-5bc1a7e7c84c", "https://medium.com/@Sebdraven/apt-sidewinder-tricks-powershell-anti-forensics-and-execution-side-loading-5bc1a7e7c84c",
"https://s.tencent.com/research/report/479.html" "https://s.tencent.com/research/report/479.html"
], ],