mirror of https://github.com/MISP/misp-galaxy
pull/202/head
parent
83581c62b0
commit
979c784640
|
@ -2415,26 +2415,24 @@
|
|||
{
|
||||
"value": "Coldroot",
|
||||
"description": "Coldroot, a remote access trojan (RAT), is still undetectable by most antivirus engines, despite being uploaded and freely available on GitHub for almost two years.\nThe RAT appears to have been created as a joke, \"to Play with Mac users,\" and \"give Mac it's rights in this [the RAT] field,\" but has since expanded to work all three major desktop operating systems — Linux, macOS, and Windows— according to a screenshot of its builder extracted from a promotional YouTube video.",
|
||||
"uuid": "0a1b71bc-21f6-11e8-8f58-371613fbbd8a",
|
||||
"uuid": "86f1f048-4eca-11e8-a08e-7708666ace6e",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.bleepingcomputer.com/news/security/coldroot-rat-still-undetectable-despite-being-uploaded-on-github-two-years-ago/",
|
||||
"https://github.com/xlinshan/Coldroot"
|
||||
]
|
||||
},
|
||||
"uuid": "86f1f048-4eca-11e8-a08e-7708666ace6e"
|
||||
}
|
||||
},
|
||||
{
|
||||
"value": "Comnie",
|
||||
"description": "Comnie is a RAT originally identified by Sophos. It has been using Github, Tumbler and Blogspot as covert channels for its C2 communications. Comnie has been observed targetting government, defense, aerospace, high-tech and telecommunication sectors in Asia.",
|
||||
"uuid": "fbc5bbb2-38b4-4fa3-9b9f-624e05cdc648",
|
||||
"uuid": "d14806fe-4ecb-11e8-a120-ff726de6a4d3",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://exchange.xforce.ibmcloud.com/collection/East-Asia-Organizations-Victims-of-Comnie-Attack-12749a9dbc20e2f40b3ae99c43416d8c",
|
||||
"https://researchcenter.paloaltonetworks.com/2018/01/unit42-comnie-continues-target-organizations-east-asia/"
|
||||
]
|
||||
},
|
||||
"uuid": "d14806fe-4ecb-11e8-a120-ff726de6a4d3"
|
||||
}
|
||||
},
|
||||
{
|
||||
"value": "GravityRAT",
|
||||
|
|
Loading…
Reference in New Issue