Skip to content

Commit

Permalink
fix typo
Browse files Browse the repository at this point in the history
  • Loading branch information
dzbeck committed Jul 10, 2019
1 parent cc0d9aa commit ce3b694
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion README.md
Expand Up @@ -27,7 +27,7 @@ Malware Objectives are defined below. Follow the links to view associated Behavi
|[**Credential Access**](https://github.com/MAECProject/malware-behaviors/blob/master/credential-access/README.md)|Malware aims to obtain credential access, allowing it or its underlying threat actor to assume control of an account, with the associated system and network permissions.|
|[**Defense Evasion**](https://github.com/MAECProject/malware-behaviors/blob/master/defense-evasion/README.md)|Malware aims to evade detection or avoid other cybersecurity defenses.|
|[**Discovery**](https://github.com/MAECProject/malware-behaviors/blob/master/discovery/README.md)|Malware aims to gain knowledge about the system and internal network.|
|[**Execution**](https://github.com/MAECProject/malware-behaviors/blob/master/execution/README.md)|Malware aims to execute it's code on a system to achieve secondary objectives, in conjunction with its primary objectives.|
|[**Execution**](https://github.com/MAECProject/malware-behaviors/blob/master/execution/README.md)|Malware aims to execute its code on a system to achieve secondary objectives, in conjunction with its primary objectives.|
|[**Exfiltration**](https://github.com/MAECProject/malware-behaviors/blob/master/exfiltration/README.md)| Malware aims to steal data from the system on which it executes. This includes stored data (e.g., files) as well as data input into applications (e.g., web browser).|
|[**Impact**](https://github.com/MAECProject/malware-behaviors/blob/master/impact/README.md)|Malware aims to execute its mission.|
|[**Lateral Movement**](https://github.com/MAECProject/malware-behaviors/blob/master/lateral-movement/README.md)|Malware aims to propagate through the infection of a system or is able to infect a file after executing on a system. The malware may infect actively (e.g., gain access to a machine directly) or passively (e.g., send malicious email).|
Expand Down
2 changes: 1 addition & 1 deletion anti-behavioral-analysis/detect-sandbox.md
Expand Up @@ -22,7 +22,7 @@ Malware Examples
----------------
|Name|Date|Description|
|-----------------------------|--------|-----------------------------|
|[**Rebhip**](https://github.com/MAECProject/malware-behaviors/blob/master/xample-malware/redhip.md)| January 2011 | Rebhip detects publicly available automated analysis workbenches (e.g., Joe Box) by considering OS product keys and special DLLs. [[1]](#1)|
|[**Redhip**](https://github.com/MAECProject/malware-behaviors/blob/master/xample-malware/redhip.md)| January 2011 | Redhip detects publicly available automated analysis workbenches (e.g., Joe Box) by considering OS product keys and special DLLs. [[1]](#1)|
|**Rombertik**| May 2015| [[2]](#2)|

References
Expand Down

0 comments on commit ce3b694

Please sign in to comment.