From f6ed00233e77968ad63cd5ad09570de8e19bfe72 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Thu, 11 Mar 2021 09:52:25 +0100 Subject: [PATCH] chg: [ransomware] fix the broken UUID fix #628 --- clusters/ransomware.json | 36 ++++++++++++++++++------------------ 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/clusters/ransomware.json b/clusters/ransomware.json index 3af29be..08b20bc 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -13411,7 +13411,7 @@ "https://www.fortinet.com/blog/threat-research/analysis-of-new-globeimposter-ransomware-variant.html" ] }, - "uuid": "8cfa694c-2e6b-310a-728f-027d981870b2", + "uuid": "a4631cef-dc51-4bee-a51f-3f1ea75ff201", "value": "GlobeImposter" }, { @@ -13423,7 +13423,7 @@ "https://spyware-techie.com/blackworm-ransomware-removal-guide" ] }, - "uuid": "8cfa694a-2e5b-300a-727f-027d881870b2", + "uuid": "457e9a45-607e-41ef-8ad1-bf8684722445", "value": "BlackWorm" }, { @@ -13435,7 +13435,7 @@ "https://malware.wikia.org/wiki/Tellyouthepass" ] }, - "uuid": "7cfa694a-1e5b-300a-627f-027d881870b1", + "uuid": "c6ca9b44-d0cd-40c9-9d00-39e0f7bcae79", "value": "Tellyouthepass" }, { @@ -13446,7 +13446,7 @@ "https://www.2-spyware.com/remove-bigbobross-ransomware.html" ] }, - "uuid": "8cfa684a-1e4b-309a-617f-026d881870b1", + "uuid": "5d3fc33b-8e90-4d9d-8f45-f047264ce8cb", "value": "BigBobRoss" }, { @@ -13457,7 +13457,7 @@ "https://www.pcrisk.com/removal-guides/12121-planetary-ransomware" ] }, - "uuid": "6cfa664a-1e2b-329a-607f-026d781870b1", + "uuid": "7c742031-6b3d-4c3a-8b36-9154a6dc7b30", "value": "Planetary" }, { @@ -13474,7 +13474,7 @@ "Cripttor" ] }, - "uuid": "8cfa554a-1e1b-328a-606f-026d771870b1", + "uuid": "e19d92d7-cf17-4b2b-8ec2-1efc6df2fa1e", "value": "Cr1ptT0r" }, { @@ -13499,7 +13499,7 @@ "https://www.zdnet.com/article/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world/" ] }, - "uuid": "6cfa554a-1e1b-327a-605f-025d761570b1", + "uuid": "d2c7fb08-293e-453b-a213-adeb79505767", "value": "Phobos" }, { @@ -13511,7 +13511,7 @@ "https://www.ehackingnews.com/2019/05/getcrypt-ransomware-modus-operandi-and.html" ] }, - "uuid": "6cfa553a-1e1b-115a-401f-015d681470b1", + "uuid": "7c9df1bd-9212-4ce3-b407-636e41bc4eea", "value": "GetCrypt" }, { @@ -13523,7 +13523,7 @@ "https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections" ] }, - "uuid": "6cfa554a-1e2b-115a-400f-014d671470b1", + "uuid": "5fb75933-1ed5-4512-a062-d39865eedab0", "value": "Nemty" }, { @@ -13533,7 +13533,7 @@ "https://www.acronis.com/en-us/blog/posts/meet-buran-new-delphi-ransomware-delivered-rig-exploit-kit" ] }, - "uuid": "6cfa554a-1e1b-114a-300f-013d671370b0", + "uuid": "a92b2165-29e7-463a-b3d5-c8b7d8a25f65", "value": "Buran" }, { @@ -13543,7 +13543,7 @@ "https://securitynews.sonicwall.com/xmlpost/hildacrypt-ransomware-actively-spreading-in-the-wild/" ] }, - "uuid": "6cea5549-1d1b-111a-309f-012d671360b1", + "uuid": "25fcb177-7219-4414-b5de-8aeb2e6d146f", "value": "Hildacrypt" }, { @@ -13559,7 +13559,7 @@ "Sherminator" ] }, - "uuid": "7cea4438-1d1c-121a-30af-011d661260b2", + "uuid": "2e8aa6da-00b1-4222-b212-c48a7348893c", "value": "Mr.Dec" }, { @@ -13573,7 +13573,7 @@ "Freezing" ] }, - "uuid": "4cea4448-1d3c-111a-40af-011d461260b4", + "uuid": "9b074569-b90c-44e6-b9b2-e6e19a48118d", "value": "Freeme" }, { @@ -13585,7 +13585,7 @@ "https://malpedia.caad.fkie.fraunhofer.de/details/win.doppelpaymer" ] }, - "uuid": "5cea5548-1e3c-222a-3faf-022d461260b5", + "uuid": "3d8989dc-9a10-4cae-ab24-ff0abed487f4", "value": "DoppelPaymer" }, { @@ -13596,7 +13596,7 @@ "https://id-ransomware.blogspot.com/2019/01/unnamed-desync-ransomware.html" ] }, - "uuid": "6cea5546-1e2c-333a-4faf-033d461360b5", + "uuid": "e5288fc1-ff2a-4992-a1fb-6a8ef612de51", "value": "Desync" }, { @@ -13609,7 +13609,7 @@ "https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us" ] }, - "uuid": "7cea8846-1f3d-331a-3ebf-055d452351b6", + "uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8", "value": "Maze" }, { @@ -13642,7 +13642,7 @@ "https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode" ] }, - "uuid": "7cea9946-1f4d-441a-4ebf-044d442454b6", + "uuid": "6f9b7c54-45fa-422c-97f0-0f0c015e3c4e", "value": "FTCode" }, { @@ -14027,5 +14027,5 @@ "value": "RansomEXX" } ], - "version": 91 + "version": 92 }