mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
chg: [ransomware] fix the broken UUID fix #628
This commit is contained in:
parent
2e9f0fcf53
commit
f6ed00233e
1 changed files with 18 additions and 18 deletions
|
@ -13411,7 +13411,7 @@
|
||||||
"https://www.fortinet.com/blog/threat-research/analysis-of-new-globeimposter-ransomware-variant.html"
|
"https://www.fortinet.com/blog/threat-research/analysis-of-new-globeimposter-ransomware-variant.html"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "8cfa694c-2e6b-310a-728f-027d981870b2",
|
"uuid": "a4631cef-dc51-4bee-a51f-3f1ea75ff201",
|
||||||
"value": "GlobeImposter"
|
"value": "GlobeImposter"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13423,7 +13423,7 @@
|
||||||
"https://spyware-techie.com/blackworm-ransomware-removal-guide"
|
"https://spyware-techie.com/blackworm-ransomware-removal-guide"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "8cfa694a-2e5b-300a-727f-027d881870b2",
|
"uuid": "457e9a45-607e-41ef-8ad1-bf8684722445",
|
||||||
"value": "BlackWorm"
|
"value": "BlackWorm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13435,7 +13435,7 @@
|
||||||
"https://malware.wikia.org/wiki/Tellyouthepass"
|
"https://malware.wikia.org/wiki/Tellyouthepass"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "7cfa694a-1e5b-300a-627f-027d881870b1",
|
"uuid": "c6ca9b44-d0cd-40c9-9d00-39e0f7bcae79",
|
||||||
"value": "Tellyouthepass"
|
"value": "Tellyouthepass"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13446,7 +13446,7 @@
|
||||||
"https://www.2-spyware.com/remove-bigbobross-ransomware.html"
|
"https://www.2-spyware.com/remove-bigbobross-ransomware.html"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "8cfa684a-1e4b-309a-617f-026d881870b1",
|
"uuid": "5d3fc33b-8e90-4d9d-8f45-f047264ce8cb",
|
||||||
"value": "BigBobRoss"
|
"value": "BigBobRoss"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13457,7 +13457,7 @@
|
||||||
"https://www.pcrisk.com/removal-guides/12121-planetary-ransomware"
|
"https://www.pcrisk.com/removal-guides/12121-planetary-ransomware"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cfa664a-1e2b-329a-607f-026d781870b1",
|
"uuid": "7c742031-6b3d-4c3a-8b36-9154a6dc7b30",
|
||||||
"value": "Planetary"
|
"value": "Planetary"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13474,7 +13474,7 @@
|
||||||
"Cripttor"
|
"Cripttor"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "8cfa554a-1e1b-328a-606f-026d771870b1",
|
"uuid": "e19d92d7-cf17-4b2b-8ec2-1efc6df2fa1e",
|
||||||
"value": "Cr1ptT0r"
|
"value": "Cr1ptT0r"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13499,7 +13499,7 @@
|
||||||
"https://www.zdnet.com/article/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world/"
|
"https://www.zdnet.com/article/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world/"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cfa554a-1e1b-327a-605f-025d761570b1",
|
"uuid": "d2c7fb08-293e-453b-a213-adeb79505767",
|
||||||
"value": "Phobos"
|
"value": "Phobos"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13511,7 +13511,7 @@
|
||||||
"https://www.ehackingnews.com/2019/05/getcrypt-ransomware-modus-operandi-and.html"
|
"https://www.ehackingnews.com/2019/05/getcrypt-ransomware-modus-operandi-and.html"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cfa553a-1e1b-115a-401f-015d681470b1",
|
"uuid": "7c9df1bd-9212-4ce3-b407-636e41bc4eea",
|
||||||
"value": "GetCrypt"
|
"value": "GetCrypt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13523,7 +13523,7 @@
|
||||||
"https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections"
|
"https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cfa554a-1e2b-115a-400f-014d671470b1",
|
"uuid": "5fb75933-1ed5-4512-a062-d39865eedab0",
|
||||||
"value": "Nemty"
|
"value": "Nemty"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13533,7 +13533,7 @@
|
||||||
"https://www.acronis.com/en-us/blog/posts/meet-buran-new-delphi-ransomware-delivered-rig-exploit-kit"
|
"https://www.acronis.com/en-us/blog/posts/meet-buran-new-delphi-ransomware-delivered-rig-exploit-kit"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cfa554a-1e1b-114a-300f-013d671370b0",
|
"uuid": "a92b2165-29e7-463a-b3d5-c8b7d8a25f65",
|
||||||
"value": "Buran"
|
"value": "Buran"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13543,7 +13543,7 @@
|
||||||
"https://securitynews.sonicwall.com/xmlpost/hildacrypt-ransomware-actively-spreading-in-the-wild/"
|
"https://securitynews.sonicwall.com/xmlpost/hildacrypt-ransomware-actively-spreading-in-the-wild/"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cea5549-1d1b-111a-309f-012d671360b1",
|
"uuid": "25fcb177-7219-4414-b5de-8aeb2e6d146f",
|
||||||
"value": "Hildacrypt"
|
"value": "Hildacrypt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13559,7 +13559,7 @@
|
||||||
"Sherminator"
|
"Sherminator"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "7cea4438-1d1c-121a-30af-011d661260b2",
|
"uuid": "2e8aa6da-00b1-4222-b212-c48a7348893c",
|
||||||
"value": "Mr.Dec"
|
"value": "Mr.Dec"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13573,7 +13573,7 @@
|
||||||
"Freezing"
|
"Freezing"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "4cea4448-1d3c-111a-40af-011d461260b4",
|
"uuid": "9b074569-b90c-44e6-b9b2-e6e19a48118d",
|
||||||
"value": "Freeme"
|
"value": "Freeme"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13585,7 +13585,7 @@
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.doppelpaymer"
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.doppelpaymer"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "5cea5548-1e3c-222a-3faf-022d461260b5",
|
"uuid": "3d8989dc-9a10-4cae-ab24-ff0abed487f4",
|
||||||
"value": "DoppelPaymer"
|
"value": "DoppelPaymer"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13596,7 +13596,7 @@
|
||||||
"https://id-ransomware.blogspot.com/2019/01/unnamed-desync-ransomware.html"
|
"https://id-ransomware.blogspot.com/2019/01/unnamed-desync-ransomware.html"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "6cea5546-1e2c-333a-4faf-033d461360b5",
|
"uuid": "e5288fc1-ff2a-4992-a1fb-6a8ef612de51",
|
||||||
"value": "Desync"
|
"value": "Desync"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13609,7 +13609,7 @@
|
||||||
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
|
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "7cea8846-1f3d-331a-3ebf-055d452351b6",
|
"uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
|
||||||
"value": "Maze"
|
"value": "Maze"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13642,7 +13642,7 @@
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode"
|
"https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "7cea9946-1f4d-441a-4ebf-044d442454b6",
|
"uuid": "6f9b7c54-45fa-422c-97f0-0f0c015e3c4e",
|
||||||
"value": "FTCode"
|
"value": "FTCode"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -14027,5 +14027,5 @@
|
||||||
"value": "RansomEXX"
|
"value": "RansomEXX"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 91
|
"version": 92
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue