mirror of https://github.com/MISP/misp-galaxy
commit
cf5c95b762
|
@ -8268,7 +8268,21 @@
|
||||||
"related": [],
|
"related": [],
|
||||||
"uuid": "95174297-6dff-47d9-bcb9-263f9b2efcfb",
|
"uuid": "95174297-6dff-47d9-bcb9-263f9b2efcfb",
|
||||||
"value": "Exaramel"
|
"value": "Exaramel"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "RDAT is a backdoor used by the suspected Iranian threat group OilRig. RDAT was originally identified in 2017 and targeted companies in the telecommunications sector.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/"
|
||||||
|
],
|
||||||
|
"type": [
|
||||||
|
"backdoor"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [],
|
||||||
|
"uuid": "d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7",
|
||||||
|
"value": "RDAT"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 142
|
"version": 143
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue