mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
chg: [threat-actor] jq all the things late in the night
This commit is contained in:
parent
d5df0d1064
commit
f621b40263
1 changed files with 3 additions and 3 deletions
|
@ -7544,14 +7544,14 @@
|
||||||
"value": "ANEL"
|
"value": "ANEL"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "BabyShark",
|
|
||||||
"uuid": "78ed653d-2d76-4a99-849e-1509e4573c32",
|
|
||||||
"description": "BabyShark is a relatively new malware. The earliest sample we found from open source repositories and our internal data sets was seen in November 2018. The malware is launched by executing the first stage HTA from a remote location, thus it can be delivered via different file types including PE files as well as malicious documents. It exfiltrates system information to C2 server, maintains persistence on the system, and waits for further instruction from the operator.",
|
"description": "BabyShark is a relatively new malware. The earliest sample we found from open source repositories and our internal data sets was seen in November 2018. The malware is launched by executing the first stage HTA from a remote location, thus it can be delivered via different file types including PE files as well as malicious documents. It exfiltrates system information to C2 server, maintains persistence on the system, and waits for further instruction from the operator.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/"
|
"https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/"
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
|
"uuid": "78ed653d-2d76-4a99-849e-1509e4573c32",
|
||||||
|
"value": "BabyShark"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 110
|
"version": 110
|
||||||
|
|
Loading…
Reference in a new issue