diff --git a/packs/win_malware.conf b/packs/win_malware.conf index e45c1b7..7e01975 100644 --- a/packs/win_malware.conf +++ b/packs/win_malware.conf @@ -419,7 +419,7 @@ "query": "SELECT object_name, object_type FROM winbaseobj WHERE object_type='Mutant' AND object_name LIKE '%cAcTuS'", "interval": 86400, "snapshot": true, - "description": "A mutex associated with Cactus ransomware was detected. Cactus is a ransomware operation that began to rise to promenance in late 2023. Threat Actors using Cactus have demanded payment to recover the encrypted files and threaten public disclosure of stolen files if victims do not pay.", + "description": "A mutex associated with Cactus ransomware was detected. Cactus is a ransomware operation that began to rise to prominence in late 2023. Threat Actors using Cactus have demanded payment to recover the encrypted files and threaten public disclosure of stolen files if victims do not pay.", "platform": [ "windows" ] diff --git a/win_malware/cactus_ransomware_mutex.yaml b/win_malware/cactus_ransomware_mutex.yaml index 68b8a52..3ba31da 100644 --- a/win_malware/cactus_ransomware_mutex.yaml +++ b/win_malware/cactus_ransomware_mutex.yaml @@ -2,7 +2,7 @@ cactus_ransomware_mutex: query: 'SELECT object_name, object_type FROM winbaseobj WHERE object_type="Mutant" AND object_name LIKE "%cAcTuS"' interval: 86400 snapshot: true - description: A mutex associated with Cactus ransomware was detected. Cactus is a ransomware operation that began to rise to promenance in late 2023. Threat Actors using Cactus have demanded payment to recover the encrypted files and threaten public disclosure of stolen files if victims do not pay. + description: A mutex associated with Cactus ransomware was detected. Cactus is a ransomware operation that began to rise to prominence in late 2023. Threat Actors using Cactus have demanded payment to recover the encrypted files and threaten public disclosure of stolen files if victims do not pay. references: - https://www.shadowstackre.com/analysis/cactus - https://www.virustotal.com/gui/file/c49b4faa6ac7b5c207410ed1e86d0f21c00f47a78c531a0a736266c436cc1c0a