From 5313f22343f0e8d8cd39c8f2572b7323111164bd Mon Sep 17 00:00:00 2001 From: semelnyk Date: Mon, 27 Nov 2023 23:18:38 +0100 Subject: [PATCH] Ran once again jq_all_the_things.sh to format JSON files --- clusters/360net.json | 2 +- clusters/botnet.json | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/clusters/360net.json b/clusters/360net.json index 799bc15..25619a6 100644 --- a/clusters/360net.json +++ b/clusters/360net.json @@ -1220,4 +1220,4 @@ } ], "version": 6 -} \ No newline at end of file +} diff --git a/clusters/botnet.json b/clusters/botnet.json index 5b1d1fc..cf2953d 100644 --- a/clusters/botnet.json +++ b/clusters/botnet.json @@ -1525,7 +1525,7 @@ { "description": "Bolek is a malware from the Kbot/Carberp family. It is being subject to frequent updates and has malicious capabilities which include self-spreading through USB and network shares, TOR network access, screen captures and web injects, and uses asymmetric cryptography to secure network communications.", "meta": { - "date": "May 2016", + "date": "May 2016", "refs": [ "https://www.bitsight.com/blog/bolek-an-evolving-botnet-targets-poland-and-ukraine" ] @@ -1617,7 +1617,7 @@ "uuid": "4ccad4ee-3bff-41ac-8d05-0d5acbaaefbe", "value": "Crackonosh" }, - { + { "description": "FluBot is a remote control and info stealer malware. It has abilities to read and send SMS message, delete app, and execute arbitrary commands. It is often distributed through SMS messages. PRODAFT describes FluBot as a banking malware which originally targeted Spain. Since the first quarter of 2021 it has been targeting many other European countries as well as Japan. It uses a DGA for it's C&C and relies on both DNS and DNS-over-HTTPS for name resolution. Despite arrests of multiple people suspected of involvement with this malware in March of 2021, the campaign has only intensified since.", "meta": { "date": "2021",