mirror of https://github.com/MISP/misp-galaxy
commit
ad445cb233
|
@ -579,7 +579,8 @@
|
|||
"meta": {
|
||||
"date": "August 2016",
|
||||
"refs": [
|
||||
"https://en.wikipedia.org/wiki/Mirai_(malware)"
|
||||
"https://en.wikipedia.org/wiki/Mirai_(malware)",
|
||||
"https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -800,7 +801,18 @@
|
|||
},
|
||||
"uuid": "07815089-e2c6-4084-9a62-3ece7210f33f",
|
||||
"value": "Bamital"
|
||||
},
|
||||
{
|
||||
"value": "Gafgyt",
|
||||
"description": "Linux.Gafgyt is a Trojan horse that opens a back door on the compromised computer and steals information. The new Gafgyt version targets a newly disclosed vulnerability affecting older, unsupported versions of SonicWall’s Global Management System (GMS).",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/",
|
||||
"https://www.symantec.com/security-center/writeup/2014-100222-5658-99"
|
||||
]
|
||||
},
|
||||
"uuid": "40795af6-b721-11e8-9fcb-570c0b384135"
|
||||
}
|
||||
],
|
||||
"version": 9
|
||||
"version": 10
|
||||
}
|
||||
|
|
|
@ -147,7 +147,17 @@
|
|||
},
|
||||
"uuid": "e85e1270-eec5-4331-8004-a063125a54b4",
|
||||
"value": "ImageTragick"
|
||||
},
|
||||
{
|
||||
"meta": {
|
||||
"logo": [
|
||||
"http://blacknurse.dk/____impro/1/onewebmedia/blacknurse2.png?etag=W%2F%2214e7-5761287d%22&sourceContentType=image%2Fpng&ignoreAspectRatio&resize=200%2B200&extract=0%2B40%2B200%2B114"
|
||||
]
|
||||
},
|
||||
"uuid": "3c2325e4-b740-11e8-9504-b32b4d974add",
|
||||
"description": "Blacknurse is a low bandwidth DDoS attack involving ICMP Type 3 Code 3 packets causing high CPU loads first discovered in November 2016. The earliest samples we have seen supporting this DDoS method are from September 2017.",
|
||||
"value": "Blacknurse"
|
||||
}
|
||||
],
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -10554,7 +10554,11 @@
|
|||
]
|
||||
},
|
||||
"uuid": "df025902-b29e-11e8-a2ab-739167419c52"
|
||||
},
|
||||
{
|
||||
"value": "Crypt0saur",
|
||||
"uuid": "32406292-b738-11e8-ab97-1f674b130624"
|
||||
}
|
||||
],
|
||||
"version": 32
|
||||
"version": 33
|
||||
}
|
||||
|
|
|
@ -5731,7 +5731,20 @@
|
|||
]
|
||||
},
|
||||
"uuid": "69ed8a69-8b33-4195-9b21-a1f4cd76acde"
|
||||
},
|
||||
{
|
||||
"value": "Sirefef",
|
||||
"description": "This family of malware uses stealth to hide its presence on your PC. Trojans in this family can do different things, including: -Downloading and running other files -Contacting remote hosts -Disabling security features\nMembers of the family can also change search results, which can generate money for the hackers who use Sirefef.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2Fsirefef"
|
||||
],
|
||||
"synonyms": [
|
||||
"Win32/Sirefef"
|
||||
]
|
||||
},
|
||||
"uuid": "641464a6-b690-11e8-976e-bffc9a17c6a4"
|
||||
}
|
||||
],
|
||||
"version": 86
|
||||
"version": 87
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue