mirror of https://github.com/MISP/misp-galaxy
chg: [malpedia] duplicate urls removed
parent
e486a83bca
commit
4ff2a45cbb
|
@ -406,7 +406,6 @@
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/apk.marcher",
|
"https://malpedia.caad.fkie.fraunhofer.de/details/apk.marcher",
|
||||||
"https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware",
|
"https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware",
|
||||||
"https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware",
|
|
||||||
"https://www.clientsidedetection.com/marcher.html",
|
"https://www.clientsidedetection.com/marcher.html",
|
||||||
"https://www.clientsidedetection.com/exobot_v2_update___staying_ahead_of_the_competition.html"
|
"https://www.clientsidedetection.com/exobot_v2_update___staying_ahead_of_the_competition.html"
|
||||||
]
|
]
|
||||||
|
@ -1881,7 +1880,6 @@
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.bella",
|
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.bella",
|
||||||
"https://blog.malwarebytes.com/threat-analysis/2017/05/another-osx-dok-dropper-found-installing-new-backdoor/",
|
"https://blog.malwarebytes.com/threat-analysis/2017/05/another-osx-dok-dropper-found-installing-new-backdoor/",
|
||||||
"https://github.com/kai5263499/Bella",
|
|
||||||
"https://github.com/kai5263499/Bella"
|
"https://github.com/kai5263499/Bella"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -3782,8 +3780,7 @@
|
||||||
"http://resources.infosecinstitute.com/beta-bot-analysis-part-1/#gref",
|
"http://resources.infosecinstitute.com/beta-bot-analysis-part-1/#gref",
|
||||||
"https://www.arbornetworks.com/blog/asert/beta-bot-a-code-review/",
|
"https://www.arbornetworks.com/blog/asert/beta-bot-a-code-review/",
|
||||||
"https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/BetaBot.pdf?la=en",
|
"https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/BetaBot.pdf?la=en",
|
||||||
"http://www.malwaredigger.com/2013/09/how-to-extract-betabot-config-info.html",
|
"http://www.malwaredigger.com/2013/09/how-to-extract-betabot-config-info.html"
|
||||||
"https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "837c5618-69dc-4817-8672-b3d7ae644f5c",
|
"uuid": "837c5618-69dc-4817-8672-b3d7ae644f5c",
|
||||||
|
@ -4124,7 +4121,6 @@
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.bundestrojaner",
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.bundestrojaner",
|
||||||
"http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf",
|
"http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf",
|
||||||
"http://www.stoned-vienna.com/analysis-of-german-bundestrojaner.html",
|
"http://www.stoned-vienna.com/analysis-of-german-bundestrojaner.html",
|
||||||
"https://www.f-secure.com/weblog/archives/00002249.html",
|
|
||||||
"https://www.f-secure.com/weblog/archives/00002249.html"
|
"https://www.f-secure.com/weblog/archives/00002249.html"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -12748,7 +12744,6 @@
|
||||||
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/",
|
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/",
|
||||||
"https://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/",
|
"https://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/",
|
||||||
"http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/",
|
"http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/",
|
||||||
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/",
|
|
||||||
"https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/",
|
"https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/",
|
||||||
"https://blog.xpnsec.com/apt28-hospitality-malware-part-2/",
|
"https://blog.xpnsec.com/apt28-hospitality-malware-part-2/",
|
||||||
"https://www.fireeye.com/blog/threat-research/2017/08/apt28-targets-hospitality-sector.html",
|
"https://www.fireeye.com/blog/threat-research/2017/08/apt28-targets-hospitality-sector.html",
|
||||||
|
@ -15752,8 +15747,7 @@
|
||||||
"type": [],
|
"type": [],
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil",
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil",
|
||||||
"https://www.blueliv.com/blog-news/research/ars-loader-evolution-zeroevil-ta545-airnaine/",
|
"https://www.blueliv.com/blog-news/research/ars-loader-evolution-zeroevil-ta545-airnaine/"
|
||||||
"https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "585f9f75-1239-4561-8815-c5ae033053a1",
|
"uuid": "585f9f75-1239-4561-8815-c5ae033053a1",
|
||||||
|
|
Loading…
Reference in New Issue