From 979c784640164535069dafa2ce9e0f8988e69f10 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Thu, 3 May 2018 16:08:27 +0200 Subject: [PATCH] jq --- clusters/rat.json | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/clusters/rat.json b/clusters/rat.json index abf2a44..d405130 100644 --- a/clusters/rat.json +++ b/clusters/rat.json @@ -2415,26 +2415,24 @@ { "value": "Coldroot", "description": "Coldroot, a remote access trojan (RAT), is still undetectable by most antivirus engines, despite being uploaded and freely available on GitHub for almost two years.\nThe RAT appears to have been created as a joke, \"to Play with Mac users,\" and \"give Mac it's rights in this [the RAT] field,\" but has since expanded to work all three major desktop operating systems — Linux, macOS, and Windows— according to a screenshot of its builder extracted from a promotional YouTube video.", - "uuid": "0a1b71bc-21f6-11e8-8f58-371613fbbd8a", + "uuid": "86f1f048-4eca-11e8-a08e-7708666ace6e", "meta": { "refs": [ "https://www.bleepingcomputer.com/news/security/coldroot-rat-still-undetectable-despite-being-uploaded-on-github-two-years-ago/", "https://github.com/xlinshan/Coldroot" ] - }, - "uuid": "86f1f048-4eca-11e8-a08e-7708666ace6e" + } }, { "value": "Comnie", "description": "Comnie is a RAT originally identified by Sophos. It has been using Github, Tumbler and Blogspot as covert channels for its C2 communications. Comnie has been observed targetting government, defense, aerospace, high-tech and telecommunication sectors in Asia.", - "uuid": "fbc5bbb2-38b4-4fa3-9b9f-624e05cdc648", + "uuid": "d14806fe-4ecb-11e8-a120-ff726de6a4d3", "meta": { "refs": [ "https://exchange.xforce.ibmcloud.com/collection/East-Asia-Organizations-Victims-of-Comnie-Attack-12749a9dbc20e2f40b3ae99c43416d8c", "https://researchcenter.paloaltonetworks.com/2018/01/unit42-comnie-continues-target-organizations-east-asia/" ] - }, - "uuid": "d14806fe-4ecb-11e8-a120-ff726de6a4d3" + } }, { "value": "GravityRAT",