chg: [malpedia] duplicate urls removed

pull/284/head
Alexandre Dulaunoy 2018-10-10 22:18:32 +02:00
parent e486a83bca
commit 4ff2a45cbb
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 2 additions and 8 deletions

View File

@ -406,7 +406,6 @@
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/apk.marcher", "https://malpedia.caad.fkie.fraunhofer.de/details/apk.marcher",
"https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware", "https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware",
"https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware",
"https://www.clientsidedetection.com/marcher.html", "https://www.clientsidedetection.com/marcher.html",
"https://www.clientsidedetection.com/exobot_v2_update___staying_ahead_of_the_competition.html" "https://www.clientsidedetection.com/exobot_v2_update___staying_ahead_of_the_competition.html"
] ]
@ -1881,7 +1880,6 @@
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.bella", "https://malpedia.caad.fkie.fraunhofer.de/details/osx.bella",
"https://blog.malwarebytes.com/threat-analysis/2017/05/another-osx-dok-dropper-found-installing-new-backdoor/", "https://blog.malwarebytes.com/threat-analysis/2017/05/another-osx-dok-dropper-found-installing-new-backdoor/",
"https://github.com/kai5263499/Bella",
"https://github.com/kai5263499/Bella" "https://github.com/kai5263499/Bella"
] ]
}, },
@ -3782,8 +3780,7 @@
"http://resources.infosecinstitute.com/beta-bot-analysis-part-1/#gref", "http://resources.infosecinstitute.com/beta-bot-analysis-part-1/#gref",
"https://www.arbornetworks.com/blog/asert/beta-bot-a-code-review/", "https://www.arbornetworks.com/blog/asert/beta-bot-a-code-review/",
"https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/BetaBot.pdf?la=en", "https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/BetaBot.pdf?la=en",
"http://www.malwaredigger.com/2013/09/how-to-extract-betabot-config-info.html", "http://www.malwaredigger.com/2013/09/how-to-extract-betabot-config-info.html"
"https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39"
] ]
}, },
"uuid": "837c5618-69dc-4817-8672-b3d7ae644f5c", "uuid": "837c5618-69dc-4817-8672-b3d7ae644f5c",
@ -4124,7 +4121,6 @@
"https://malpedia.caad.fkie.fraunhofer.de/details/win.bundestrojaner", "https://malpedia.caad.fkie.fraunhofer.de/details/win.bundestrojaner",
"http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf", "http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf",
"http://www.stoned-vienna.com/analysis-of-german-bundestrojaner.html", "http://www.stoned-vienna.com/analysis-of-german-bundestrojaner.html",
"https://www.f-secure.com/weblog/archives/00002249.html",
"https://www.f-secure.com/weblog/archives/00002249.html" "https://www.f-secure.com/weblog/archives/00002249.html"
] ]
}, },
@ -12748,7 +12744,6 @@
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/", "http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/",
"https://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/", "https://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/",
"http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/", "http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/",
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/",
"https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/", "https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/",
"https://blog.xpnsec.com/apt28-hospitality-malware-part-2/", "https://blog.xpnsec.com/apt28-hospitality-malware-part-2/",
"https://www.fireeye.com/blog/threat-research/2017/08/apt28-targets-hospitality-sector.html", "https://www.fireeye.com/blog/threat-research/2017/08/apt28-targets-hospitality-sector.html",
@ -15752,8 +15747,7 @@
"type": [], "type": [],
"refs": [ "refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil", "https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil",
"https://www.blueliv.com/blog-news/research/ars-loader-evolution-zeroevil-ta545-airnaine/", "https://www.blueliv.com/blog-news/research/ars-loader-evolution-zeroevil-ta545-airnaine/"
"https://malpedia.caad.fkie.fraunhofer.de/details/win.zeroevil"
] ]
}, },
"uuid": "585f9f75-1239-4561-8815-c5ae033053a1", "uuid": "585f9f75-1239-4561-8815-c5ae033053a1",