diff --git a/clusters/exploit-kit.json b/clusters/exploit-kit.json index 43bb6ce..dc5cd8c 100644 --- a/clusters/exploit-kit.json +++ b/clusters/exploit-kit.json @@ -53,6 +53,15 @@ "Fallout" ] }, + "related": [ + { + "dest-uuid": "5920464b-e093-4fa0-a275-438dffef228f", + "tags": [ + "estimative-language:likelihood-probability=\"almost-certain\"" + ], + "type": "dropped" + } + ], "uuid": "1f05f646-5af6-4a95-825b-164f49616aa4", "value": "Fallout" }, diff --git a/clusters/ransomware.json b/clusters/ransomware.json index f9fe3b6..e30837d 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -10083,6 +10083,15 @@ "https://www.bleepingcomputer.com/news/security/gandcrab-v5-ransomware-utilizing-the-alpc-task-scheduler-exploit/" ] }, + "related": [ + { + "dest-uuid": "1f05f646-5af6-4a95-825b-164f49616aa4", + "tags": [ + "estimative-language:likelihood-probability=\"almost-certain\"" + ], + "type": "dropped-by" + } + ], "uuid": "5920464b-e093-4fa0-a275-438dffef228f", "value": "GandCrab" },