chg: [ransomware] fix the broken UUID fix #628

pull/635/head
Alexandre Dulaunoy 2021-03-11 09:52:25 +01:00
parent 2e9f0fcf53
commit f6ed00233e
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 18 additions and 18 deletions

View File

@ -13411,7 +13411,7 @@
"https://www.fortinet.com/blog/threat-research/analysis-of-new-globeimposter-ransomware-variant.html" "https://www.fortinet.com/blog/threat-research/analysis-of-new-globeimposter-ransomware-variant.html"
] ]
}, },
"uuid": "8cfa694c-2e6b-310a-728f-027d981870b2", "uuid": "a4631cef-dc51-4bee-a51f-3f1ea75ff201",
"value": "GlobeImposter" "value": "GlobeImposter"
}, },
{ {
@ -13423,7 +13423,7 @@
"https://spyware-techie.com/blackworm-ransomware-removal-guide" "https://spyware-techie.com/blackworm-ransomware-removal-guide"
] ]
}, },
"uuid": "8cfa694a-2e5b-300a-727f-027d881870b2", "uuid": "457e9a45-607e-41ef-8ad1-bf8684722445",
"value": "BlackWorm" "value": "BlackWorm"
}, },
{ {
@ -13435,7 +13435,7 @@
"https://malware.wikia.org/wiki/Tellyouthepass" "https://malware.wikia.org/wiki/Tellyouthepass"
] ]
}, },
"uuid": "7cfa694a-1e5b-300a-627f-027d881870b1", "uuid": "c6ca9b44-d0cd-40c9-9d00-39e0f7bcae79",
"value": "Tellyouthepass" "value": "Tellyouthepass"
}, },
{ {
@ -13446,7 +13446,7 @@
"https://www.2-spyware.com/remove-bigbobross-ransomware.html" "https://www.2-spyware.com/remove-bigbobross-ransomware.html"
] ]
}, },
"uuid": "8cfa684a-1e4b-309a-617f-026d881870b1", "uuid": "5d3fc33b-8e90-4d9d-8f45-f047264ce8cb",
"value": "BigBobRoss" "value": "BigBobRoss"
}, },
{ {
@ -13457,7 +13457,7 @@
"https://www.pcrisk.com/removal-guides/12121-planetary-ransomware" "https://www.pcrisk.com/removal-guides/12121-planetary-ransomware"
] ]
}, },
"uuid": "6cfa664a-1e2b-329a-607f-026d781870b1", "uuid": "7c742031-6b3d-4c3a-8b36-9154a6dc7b30",
"value": "Planetary" "value": "Planetary"
}, },
{ {
@ -13474,7 +13474,7 @@
"Cripttor" "Cripttor"
] ]
}, },
"uuid": "8cfa554a-1e1b-328a-606f-026d771870b1", "uuid": "e19d92d7-cf17-4b2b-8ec2-1efc6df2fa1e",
"value": "Cr1ptT0r" "value": "Cr1ptT0r"
}, },
{ {
@ -13499,7 +13499,7 @@
"https://www.zdnet.com/article/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world/" "https://www.zdnet.com/article/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world/"
] ]
}, },
"uuid": "6cfa554a-1e1b-327a-605f-025d761570b1", "uuid": "d2c7fb08-293e-453b-a213-adeb79505767",
"value": "Phobos" "value": "Phobos"
}, },
{ {
@ -13511,7 +13511,7 @@
"https://www.ehackingnews.com/2019/05/getcrypt-ransomware-modus-operandi-and.html" "https://www.ehackingnews.com/2019/05/getcrypt-ransomware-modus-operandi-and.html"
] ]
}, },
"uuid": "6cfa553a-1e1b-115a-401f-015d681470b1", "uuid": "7c9df1bd-9212-4ce3-b407-636e41bc4eea",
"value": "GetCrypt" "value": "GetCrypt"
}, },
{ {
@ -13523,7 +13523,7 @@
"https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections" "https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections"
] ]
}, },
"uuid": "6cfa554a-1e2b-115a-400f-014d671470b1", "uuid": "5fb75933-1ed5-4512-a062-d39865eedab0",
"value": "Nemty" "value": "Nemty"
}, },
{ {
@ -13533,7 +13533,7 @@
"https://www.acronis.com/en-us/blog/posts/meet-buran-new-delphi-ransomware-delivered-rig-exploit-kit" "https://www.acronis.com/en-us/blog/posts/meet-buran-new-delphi-ransomware-delivered-rig-exploit-kit"
] ]
}, },
"uuid": "6cfa554a-1e1b-114a-300f-013d671370b0", "uuid": "a92b2165-29e7-463a-b3d5-c8b7d8a25f65",
"value": "Buran" "value": "Buran"
}, },
{ {
@ -13543,7 +13543,7 @@
"https://securitynews.sonicwall.com/xmlpost/hildacrypt-ransomware-actively-spreading-in-the-wild/" "https://securitynews.sonicwall.com/xmlpost/hildacrypt-ransomware-actively-spreading-in-the-wild/"
] ]
}, },
"uuid": "6cea5549-1d1b-111a-309f-012d671360b1", "uuid": "25fcb177-7219-4414-b5de-8aeb2e6d146f",
"value": "Hildacrypt" "value": "Hildacrypt"
}, },
{ {
@ -13559,7 +13559,7 @@
"Sherminator" "Sherminator"
] ]
}, },
"uuid": "7cea4438-1d1c-121a-30af-011d661260b2", "uuid": "2e8aa6da-00b1-4222-b212-c48a7348893c",
"value": "Mr.Dec" "value": "Mr.Dec"
}, },
{ {
@ -13573,7 +13573,7 @@
"Freezing" "Freezing"
] ]
}, },
"uuid": "4cea4448-1d3c-111a-40af-011d461260b4", "uuid": "9b074569-b90c-44e6-b9b2-e6e19a48118d",
"value": "Freeme" "value": "Freeme"
}, },
{ {
@ -13585,7 +13585,7 @@
"https://malpedia.caad.fkie.fraunhofer.de/details/win.doppelpaymer" "https://malpedia.caad.fkie.fraunhofer.de/details/win.doppelpaymer"
] ]
}, },
"uuid": "5cea5548-1e3c-222a-3faf-022d461260b5", "uuid": "3d8989dc-9a10-4cae-ab24-ff0abed487f4",
"value": "DoppelPaymer" "value": "DoppelPaymer"
}, },
{ {
@ -13596,7 +13596,7 @@
"https://id-ransomware.blogspot.com/2019/01/unnamed-desync-ransomware.html" "https://id-ransomware.blogspot.com/2019/01/unnamed-desync-ransomware.html"
] ]
}, },
"uuid": "6cea5546-1e2c-333a-4faf-033d461360b5", "uuid": "e5288fc1-ff2a-4992-a1fb-6a8ef612de51",
"value": "Desync" "value": "Desync"
}, },
{ {
@ -13609,7 +13609,7 @@
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us" "https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
] ]
}, },
"uuid": "7cea8846-1f3d-331a-3ebf-055d452351b6", "uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
"value": "Maze" "value": "Maze"
}, },
{ {
@ -13642,7 +13642,7 @@
"https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode" "https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode"
] ]
}, },
"uuid": "7cea9946-1f4d-441a-4ebf-044d442454b6", "uuid": "6f9b7c54-45fa-422c-97f0-0f0c015e3c4e",
"value": "FTCode" "value": "FTCode"
}, },
{ {
@ -14027,5 +14027,5 @@
"value": "RansomEXX" "value": "RansomEXX"
} }
], ],
"version": 91 "version": 92
} }