Skip to content
This repository was archived by the owner on Jan 10, 2025. It is now read-only.

Commit fa42beb

Browse files
authored
Update README.MD
1 parent 3d345e5 commit fa42beb

File tree

1 file changed

+15
-3
lines changed

1 file changed

+15
-3
lines changed

blog/mozin-about/README.MD

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,23 @@ The Mozi botnet is an ongoing malware campaign targeting unsecured and vulnerabl
66
## URL
77
https://www.elastic.co/blog/[tbd]
88

9+
## Usage
10+
11+
To load the sample data, you need a local instance of Elasticsearch and Kibana. If you are using anything beyond a default local deployment, you'll need to modify `collection.sh` to match your deployment.
12+
13+
```
14+
git clone https://github.com/elastic/examples
15+
cd examples/blog/mozin-about
16+
sh clollection.sh
17+
```
18+
Log into your Kibana instance to explore the data in the `indicators` Index Pattern.
19+
920
## Artifacts
1021
Artifacts and code snippets from the blog post.
1122

1223
| Artifact | Description | Note |
1324
| - | - | - |
14-
| [Mozi Collection Script](./collection.sh) | Script to collect Mozi samples and send to Elasticsearch | NA |
15-
| [Ingest Node Pipeline](./ingest-node-pipeline.json) | ThreatFox Ingest Node Pipeline | NA |
16-
| [YARA Signature](./mozi-obfuscation-technique.yara) | Mozi obfuscation technique YARA signature | NA |
25+
| [Mozi Collection Script](./collection.sh) | Script to collect Mozi samples and send to Elasticsearch |
26+
| [Ingest Node Pipeline](./ingest-node-pipeline.json) | ThreatFox Ingest Node Pipeline |
27+
| [Index Settings](./index-settings.json) | Settings for the Indicators index |
28+
| [YARA Signature](./mozi-obfuscation-technique.yara) | Mozi obfuscation technique YARA signature |

0 commit comments

Comments
 (0)