~alienagain/curious_butterfly

764619f0d8bf389aafd38a162b3d821b8ea44b1c — terceranexus6 1 year, 7 months ago 5e18a2a
styling
1 files changed, 3 insertions(+), 0 deletions(-)

M README.md
M README.md => README.md +3 -0
@@ 16,4 16,7 @@ chmod u+x cubu
```

A pop up will appear. The example provided is Sparkling Goblin, a threat actor. The `.raku` script is based on strings inside malware samples of Sparkling Goblin. If entered the folder (`samples` in this case) and the threat name (`sparkling_goblin` in this case), a file would be generated with coincidences found, and written in a file which name that looks like `results_<threat name>` in this case `results_sparkling_goblin`.

----

![](https://im4.ezgif.com/tmp/ezgif-4-fdff4c23fc.gif)